Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
shipping advice.exe

Overview

General Information

Sample name:shipping advice.exe
Analysis ID:1496592
MD5:1e158beaa852a13274b19effe4a010d9
SHA1:1d86155b0195a451e36a3d49cd098fba4bf6da23
SHA256:d54abd6ac9348ed05c33f77ae723cb262bd89fcce7d4d449f16b31ed01f401f4
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • shipping advice.exe (PID: 2668 cmdline: "C:\Users\user\Desktop\shipping advice.exe" MD5: 1E158BEAA852A13274B19EFFE4A010D9)
    • RegSvcs.exe (PID: 4196 cmdline: "C:\Users\user\Desktop\shipping advice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.thelamalab.com", "Username": "billing@thelamalab.com", "Password": "Thel@malab@20!9"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.3424070590.000000000245E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              2.2.RegSvcs.exe.1b0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                2.2.RegSvcs.exe.1b0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.1b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x334a1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x33513:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3359d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x3362f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x33699:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x3370b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x337a1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x33831:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.shipping advice.exe.1bf0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.2.shipping advice.exe.1bf0000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 4 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.251.80.30, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 4196, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49725
                      Timestamp:2024-08-21T14:36:09.545560+0200
                      SID:2030171
                      Severity:1
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-08-21T14:36:09.545560+0200
                      SID:2839723
                      Severity:1
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-08-21T14:36:09.545560+0200
                      SID:2840032
                      Severity:1
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-08-21T14:36:19.603509+0200
                      SID:2855245
                      Severity:1
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-08-21T14:36:19.603509+0200
                      SID:2855542
                      Severity:1
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 2.2.RegSvcs.exe.1b0000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.thelamalab.com", "Username": "billing@thelamalab.com", "Password": "Thel@malab@20!9"}
                      Source: shipping advice.exeReversingLabs: Detection: 50%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: shipping advice.exeJoe Sandbox ML: detected
                      Source: shipping advice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: Binary string: wntdll.pdbUGP source: shipping advice.exe, 00000000.00000003.2191898786.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, shipping advice.exe, 00000000.00000003.2194836820.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: shipping advice.exe, 00000000.00000003.2191898786.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, shipping advice.exe, 00000000.00000003.2194836820.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_008BDBBE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0088C2A2 FindFirstFileExW,0_2_0088C2A2
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C68EE FindFirstFileW,FindClose,0_2_008C68EE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_008C698F
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008BD076
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008BD3A9
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008C9642
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008C979D
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_008C9B2B
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_008C5C97

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: global trafficTCP traffic: 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                      Source: global trafficTCP traffic: 192.168.2.5:49725 -> 162.251.80.30:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008CCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_008CCE44
                      Source: global trafficDNS traffic detected: DNS query: mail.thelamalab.com
                      Source: RegSvcs.exe, 00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.thelamalab.com
                      Source: shipping advice.exe, 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, abAX9N.cs.Net Code: K8VU1S
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008CEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_008CEAFF
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008CED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_008CED6A
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008CEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_008CEAFF
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_008BAA57
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008E9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_008E9576

                      System Summary

                      barindex
                      Source: 2.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.shipping advice.exe.1bf0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: shipping advice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                      Source: shipping advice.exe, 00000000.00000000.2181110057.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_719fbda2-2
                      Source: shipping advice.exe, 00000000.00000000.2181110057.0000000000912000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1258c0ce-3
                      Source: shipping advice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_64cc1775-4
                      Source: shipping advice.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_903bc66f-b
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_008BD5EB
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_008B1201
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_008BE8F6
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C20460_2_008C2046
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008580600_2_00858060
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B82980_2_008B8298
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0088E4FF0_2_0088E4FF
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0088676B0_2_0088676B
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008E48730_2_008E4873
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0087CAA00_2_0087CAA0
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0085CAF00_2_0085CAF0
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0086CC390_2_0086CC39
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00886DD90_2_00886DD9
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008591C00_2_008591C0
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0086B1190_2_0086B119
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008713940_2_00871394
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008717060_2_00871706
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0087781B0_2_0087781B
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008719B00_2_008719B0
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008579200_2_00857920
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0086997D0_2_0086997D
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00877A4A0_2_00877A4A
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00877CA70_2_00877CA7
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00871C770_2_00871C77
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00889EEE0_2_00889EEE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008DBE440_2_008DBE44
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00871F320_2_00871F32
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_01BE36200_2_01BE3620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00964A982_2_00964A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00969BE82_2_00969BE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0096CDA02_2_0096CDA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00963E802_2_00963E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_009641C82_2_009641C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00969BE22_2_00969BE2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059287782_2_05928778
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059226E02_2_059226E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059200402_2_05920040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059252C82_2_059252C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0592D9002_2_0592D900
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0592B8F82_2_0592B8F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05923B382_2_05923B38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05922E302_2_05922E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05924BE82_2_05924BE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0096DACA2_2_0096DACA
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: String function: 0086F9F2 appears 40 times
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: String function: 00859CB3 appears 31 times
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: String function: 00870A30 appears 46 times
                      Source: shipping advice.exe, 00000000.00000003.2192844802.0000000003A13000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping advice.exe
                      Source: shipping advice.exe, 00000000.00000003.2193321638.0000000003BBD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping advice.exe
                      Source: shipping advice.exe, 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d02a015-5a5b-4340-adbb-c530e02a0bc4.exe4 vs shipping advice.exe
                      Source: shipping advice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: 2.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.shipping advice.exe.1bf0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C37B5 GetLastError,FormatMessageW,0_2_008C37B5
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B10BF AdjustTokenPrivileges,CloseHandle,0_2_008B10BF
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_008B16C3
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008C51CD
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008DA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_008DA67C
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_008C648E
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008542A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_008542A2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\shipping advice.exeFile created: C:\Users\user\AppData\Local\Temp\aut9A2F.tmpJump to behavior
                      Source: shipping advice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: shipping advice.exeReversingLabs: Detection: 50%
                      Source: unknownProcess created: C:\Users\user\Desktop\shipping advice.exe "C:\Users\user\Desktop\shipping advice.exe"
                      Source: C:\Users\user\Desktop\shipping advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping advice.exe"
                      Source: C:\Users\user\Desktop\shipping advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping advice.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: shipping advice.exeStatic file information: File size 1180160 > 1048576
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: shipping advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wntdll.pdbUGP source: shipping advice.exe, 00000000.00000003.2191898786.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, shipping advice.exe, 00000000.00000003.2194836820.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: shipping advice.exe, 00000000.00000003.2191898786.00000000038F0000.00000004.00001000.00020000.00000000.sdmp, shipping advice.exe, 00000000.00000003.2194836820.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                      Source: shipping advice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: shipping advice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: shipping advice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: shipping advice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: shipping advice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008542DE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00870A76 push ecx; ret 0_2_00870A89
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0086F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0086F98E
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008E1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008E1C41
                      Source: C:\Users\user\Desktop\shipping advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\shipping advice.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98152
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\shipping advice.exeAPI/Special instruction interceptor: Address: 1BE3244
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3694Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 850Jump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeAPI coverage: 3.7 %
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_008BDBBE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0088C2A2 FindFirstFileExW,0_2_0088C2A2
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C68EE FindFirstFileW,FindClose,0_2_008C68EE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_008C698F
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008BD076
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008BD3A9
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008C9642
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008C979D
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_008C9B2B
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_008C5C97
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008542DE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98719Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98297Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98166Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97929Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: shipping advice.exe, 00000000.00000002.2197680755.0000000001050000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ewxQemUiEk5ZDVeUr
                      Source: RegSvcs.exe, 00000002.00000002.3425636515.0000000005820000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008CEAA2 BlockInput,0_2_008CEAA2
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00882622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00882622
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008542DE
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00874CE8 mov eax, dword ptr fs:[00000030h]0_2_00874CE8
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_01BE3510 mov eax, dword ptr fs:[00000030h]0_2_01BE3510
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_01BE34B0 mov eax, dword ptr fs:[00000030h]0_2_01BE34B0
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_01BE1E70 mov eax, dword ptr fs:[00000030h]0_2_01BE1E70
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_008B0B62
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00882622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00882622
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0087083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0087083F
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008709D5 SetUnhandledExceptionFilter,0_2_008709D5
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00870C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00870C21
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\shipping advice.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 2B3008Jump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_008B1201
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00892BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00892BA5
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008BB226 SendInput,keybd_event,0_2_008BB226
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008D22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008D22DA
                      Source: C:\Users\user\Desktop\shipping advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping advice.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_008B0B62
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008B1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_008B1663
                      Source: shipping advice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                      Source: shipping advice.exeBinary or memory string: Shell_TrayWnd
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_00870698 cpuid 0_2_00870698
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008C8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_008C8195
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008AD27A GetUserNameW,0_2_008AD27A
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_0088B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0088B952
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008542DE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3424070590.000000000245E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3424070590.0000000002411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping advice.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: shipping advice.exeBinary or memory string: WIN_81
                      Source: shipping advice.exeBinary or memory string: WIN_XP
                      Source: shipping advice.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                      Source: shipping advice.exeBinary or memory string: WIN_XPe
                      Source: shipping advice.exeBinary or memory string: WIN_VISTA
                      Source: shipping advice.exeBinary or memory string: WIN_7
                      Source: shipping advice.exeBinary or memory string: WIN_8
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3424070590.0000000002411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping advice.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping advice.exe.1bf0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3424070590.000000000245E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3424070590.0000000002411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping advice.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008D1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_008D1204
                      Source: C:\Users\user\Desktop\shipping advice.exeCode function: 0_2_008D1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_008D1806
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure2
                      Valid Accounts
                      121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts1
                      Native API
                      2
                      Valid Accounts
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      121
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                      Valid Accounts
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      2
                      File and Directory Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      NTDS138
                      System Information Discovery
                      Distributed Component Object Model121
                      Input Capture
                      1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                      Process Injection
                      2
                      Valid Accounts
                      LSA Secrets331
                      Security Software Discovery
                      SSH3
                      Clipboard Data
                      11
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials221
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                      Access Token Manipulation
                      DCSync2
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                      Process Injection
                      Proc Filesystem11
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      System Owner/User Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      shipping advice.exe50%ReversingLabsWin32.Hacktool.Mimikatz
                      shipping advice.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://account.dyn.com/0%URL Reputationsafe
                      http://mail.thelamalab.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.214.172
                      truefalse
                        unknown
                        mail.thelamalab.com
                        162.251.80.30
                        truetrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://mail.thelamalab.comRegSvcs.exe, 00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://account.dyn.com/shipping advice.exe, 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          162.251.80.30
                          mail.thelamalab.comUnited States
                          394695PUBLIC-DOMAIN-REGISTRYUStrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1496592
                          Start date and time:2024-08-21 14:35:07 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 5m 23s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:shipping advice.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 46
                          • Number of non-executed functions: 295
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: shipping advice.exe
                          TimeTypeDescription
                          08:36:16API Interceptor22x Sleep call for process: RegSvcs.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          bg.microsoft.map.fastly.nethttps://filegen.fortinet.com/v1/sandbox-file?file_name=windows.exeGet hashmaliciousUnknownBrowse
                          • 199.232.214.172
                          http://www.pro-pharma.co.ukGet hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          MTWE UNTITLED.xlsGet hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 199.232.214.172
                          http://mantraonlittlebourke.guestreservations.com/35061/booking?gad_source=1&gclid=EAIaIQobChMIl-2ym7yFiAMV19QWBR2tTADfEAAYAiAFEgIBzPD_BwEGet hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          1724226659ad3c86adf90ead8e85be00ee17653b242dddaf7b133397ec2c8c708c9397b763517.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          • 199.232.210.172
                          http://qemailserver.comGet hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          4oaZbWLah0.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                          • 199.232.210.172
                          air_way_bill_Dhl_invoice_bl_pl_21_08_2024_00000000.xlsGet hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          Tracking_Invoice_Awb_BL_00340434757340073972.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 199.232.214.172
                          mail.thelamalab.comnew p o.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SecuriteInfo.com.Win32.PWSX-gen.27121.31008.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SecuriteInfo.com.Win32.PWSX-gen.28055.17747.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SHIPPING ORDER.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          receipt-73633T36X90N.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          AQQ-T7630-CVE8.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SecuriteInfo.com.Win32.CrypterX-gen.1573.32091.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SCAN_INCORRECT_DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          SecuriteInfo.com.Heur.26171.30744.exeGet hashmaliciousAgentTeslaBrowse
                          • 162.222.226.100
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          PUBLIC-DOMAIN-REGISTRYUSrShippingDocuments.exeGet hashmaliciousAgentTeslaBrowse
                          • 207.174.215.249
                          rShippingDocuments.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 207.174.215.249
                          New PO pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 208.91.199.224
                          https://vagvn.remmipyservice.org/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=7f545595-f5d6-deb9-f7f9-d2b50e22cac0&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638594191528303546.52bdeb30-750b-42d2-83a1-0b37c2fd3e58&state=DctBFoAgCABRrNdxSARJPI6kbVt2_Vj82U0CgD1sIVEE2iWmvZZelE1ItF6nss_lQtiUHCtPRpNRkFzazc-UpZbiPfL7jfwD&sso_reload=truGet hashmaliciousHTMLPhisherBrowse
                          • 199.79.63.24
                          http://sapr.co.inGet hashmaliciousUnknownBrowse
                          • 103.53.42.238
                          http://payment1-payu.maklifedairy.in/Get hashmaliciousUnknownBrowse
                          • 45.113.122.245
                          Shipping Documents.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 207.174.215.249
                          https://professionalprojectmanagementpro.benchurl.com/c/l?u=116E33D3&e=188D7F3&c=167E3A&t=0&l=108F0FCB5&email=kVZdtuK%2FWFCzmtjGcu30tMObv%2BTy5rLraMk9iWbyXew%3D&seq=1Get hashmaliciousUnknownBrowse
                          • 162.215.241.39
                          QUOTE-4K748388-A-CCC2.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 199.79.62.115
                          SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                          • 208.91.199.224
                          No context
                          No context
                          Process:C:\Users\user\Desktop\shipping advice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):155250
                          Entropy (8bit):7.944538058202758
                          Encrypted:false
                          SSDEEP:3072:Dd1HSbvETM58njvOcXtnLHy0ske90SZeKn70mfGY2Huvy:DbWvETMCTOc9LHYto6uNOK
                          MD5:B31AA4F091115E14A5C45B0302AD1152
                          SHA1:FF5C09EC199A2EE10C85B0312EB28237133CF8C8
                          SHA-256:2264FA7FA732BDA5B2C568D2B4A6EE34B2D23B1289D37788AA5569C7083BF502
                          SHA-512:CC9CC835DD659B44267F622357F3666CA2D862CD14189956A34C66AA6EAAE97D2130103EAB8756A9480D5FA8DAB558A598F97FD6D7C5DD30F8D59B141289A3DA
                          Malicious:false
                          Reputation:low
                          Preview:EA06.....B{..=VsT......1.Li.9..K..f4@.r...Q..9.X._50..t....3.?...X...u....<..#..j..b#6.Odu..1..$R.4.{.._..:.zc...'....c.i.Z.O.Mi.....s[zu..X.Wf4..cU..9.u.....`..-2...5Z]..\..\`....P.kD....1M..zs.u.k1..\5J...q....r?...>...;.L.....&5....S.....M....sv..`...Si..q...jsX.....\l..@....C...@..F...|j..uT.........Zc....$.1....*...1.fi..?.J.N..\|~.U.........c..Ti.[.RsW.\).j}T......%./.7...`...~.S.]62.=3i...?......h)U..r?.......-#..cS_mj....)..Fs.'.Q.sj.O........%.L.Si..........L......Y..-..g.z..{.3A...1X^.A0.j&...._6.....kT..>U......h.......`....U...1/..w..Qf..'.....g.P..~..V.3..y<..$.......". .b...A.?K...&..,............M:.g.@".....']./f...3.....5.K.9.w.a..".8..}>..b....E]..e..#9..a.z..5..fSZ...C.n.....S..).y.j.@.r...V...[7.......G%:IP.>6.:n....p.Z.9..1.t...^..\....*.nQ...fq...+C.N'..<..q.E.Wy..A+....H...4...U.Ui.9..g1..f5......Q..:.Na.....:...C.u:Lo.W..(u*..@..U#5..wW..iq.%V.'.....`..*4.UV.W....j$....C,.i.Zwn.s*.J..aR../....F...5i.:.#
                          Process:C:\Users\user\Desktop\shipping advice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):43604
                          Entropy (8bit):7.8266678081588195
                          Encrypted:false
                          SSDEEP:768:RvPvvqR1vkp9mA4hyLm/mmpvX5b0G8dJSG05M6UMD5oQEuldNI6J2RVYL:RX3EJhei/mmfVJ0Z57uNIxVY
                          MD5:597857FF440CDEBF01F5AD06A9F0281B
                          SHA1:CF9E5565268446C243E2020407C3B67D866BF39B
                          SHA-256:35EE8009679D11575045DB91A94FA8332D1097026E8A1FB3D64EF8CDAFB98540
                          SHA-512:19856837084F90F1524CAAFA98AC9E19FC0FDB0B102A6784488F793F0744E5801686A6B3BF235E038B25BCA4B1455C803E1D136D9DFBA23582E0733C5663A158
                          Malicious:false
                          Reputation:low
                          Preview:EA06..P...*.y.^g5......6.U..Z..gM..(.9.jm5..u.....L..9..3.Sfs...aV..*39.*g6.L.i.....?*.9..m2.L....3.T...\.`.NV&sj..qQ..i.9..g5..6.9..m2.L.5Y..3..@..L.v....J$.mD.6.s9.bg4...)....Rf....oJ.....\.5.P@.s6.o)39..g9.L.0.....M.UI..Q6..;I.Rg0.L........L.. ..qG..h.9..g5.......6.c' ...g5..1.......F.........)....M.u...6...sj4.gC.f. !.8.U..&....E....d...!.fg8.L.t....gV..`...B....3.P.s.8.a3..s......i.9..qW.`...P.......2.....M+Si.>g9....i.*m1...T...aQ@...<V.B.D.:..*`.L.3.Q..*X....M.x.O............U`.fh......Fm2.L.5I...$.7(.<u`.....y......L....`....*..b..P..:8.....8.}A...S9.Vg9...P......4I...d....@.......-..yK.L.si.`.!.Rf.Z`..Z....O0.P.j...@.4...2&....6.Pf.jd.mB....i.T..Li.9...X...."...*....D...`.N......4...m6...........@*..F)`#U`....@Q..k8...r. ..6.R......6.\...@..T....@50./T0 .....*...*g4..(............ '.$.!..h........h.4.......0....&.`........3.P..ZH.D.K..5P-.....M@...f..M(3i.4....F...J..a. 0..d.....R...y.#r.3.Q..@I*`.@.m.I...[...d..T.B....5P..j..t
                          Process:C:\Users\user\Desktop\shipping advice.exe
                          File Type:ASCII text, with very long lines (65536), with no line terminators
                          Category:dropped
                          Size (bytes):86022
                          Entropy (8bit):4.179408874405051
                          Encrypted:false
                          SSDEEP:1536:19WzryPvDc9t83Syq5bA5tY9oxboaxTkxbQ5XPjnTlIm6LPI97d:10zr9t75SrkE5fim6LPA
                          MD5:9144273E790C6157A2EE262330EF44FB
                          SHA1:7F04CC15DAEFE1620B4624FE020DD536E482EA7B
                          SHA-256:7A4DA087C866098C7CD21F6E8DF4A077AF7127D50B48F62D963A030BF457F62C
                          SHA-512:51810807D20C8D98B9FE4BB1CD9FE79A38EEA3944EAD1BB9A00F253D2D976792E91B3402FE9A192BE67BD7CC11DA8915E03F98FD44D04CC9577DBA28A2E1FB1C
                          Malicious:false
                          Reputation:low
                          Preview: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
                          Process:C:\Users\user\Desktop\shipping advice.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):240128
                          Entropy (8bit):6.655471882086101
                          Encrypted:false
                          SSDEEP:6144:8kLkGxWalf8qACzc4w/q39h/8/UV9RJ9h:5LkGFlf8qPc4w/qz/8/4nJb
                          MD5:963BF1B51D3853A2775F6212B97E670A
                          SHA1:CFCB7AC8604428C980E46D6B39A0027A8FD604A4
                          SHA-256:DFF02045F7ABC1FE81729B19110CE093E99B624D8A66DEC0D935BB98E45725F8
                          SHA-512:0BD21EB84DEE6DA8E14B198B6360F586FF832A8C3FF25FDA0D117CFE22CC653FF81C577CE9638A4F0B38F251BD0EA29C61AFCF43CC4CE0224A8F06330C3C99A7
                          Malicious:false
                          Reputation:low
                          Preview:...1GU9TGRWN..S1.1NS51UK.M1DU9TCRWNFOS1V1NS51UKSM1DU9TCRWNFO.1V1@L.?U.Z...Tu.b.?'5o#C9V<2X.6*=#^0u[1c " f&=..~.sX^1.}@<Nq9TCRWNF..1V}OP5O.S5M1DU9TCR.NDNX0]1N.61UCSM1DU9..QWNfOS1.2NS5qUKsM1DW9TGRWNFOS1R1NS51UKSM5DU;TCRWNFMSq.1NC51EKSM1TU9DCRWNFOC1V1NS51UKSM..V9.CRWN.LSwS1NS51UKSM1DU9TCRWNF.P1Z1NS51UKSM1DU9TCRWNFOS1V1NS51UKSM1DU9TCRWNFOS1V1NS51UkSM9DU9TCRWNFOS9v1N.51UKSM1DU9Tm&262OS1..MS5.UKS.2DU;TCRWNFOS1V1NS5.UK3cC7'ZTCR.KFOS.U1NU51U.PM1DU9TCRWNFOSqV1.}GT9$0M1HU9TC.TNFMS1V.MS51UKSM1DU9TC.WN.OS1V1NS51UKSM1DU..@RWNFO.1V1LS01..QM.tT9WCRWOFOU1V1NS51UKSM1DU9TCRWNFOS1V1NS51UKSM1DU9TCRWNFOS1V,......m.Lz_[S.t.).L..E..*.~Z.F.JP...._......#7..5.Z{...M...'.FC6R......Q^:]%b3z65.O....n."q..3_.1..:g.:Ev.g....u..y>!....0..7,?y/6??Txb/5TC<.Q.0DU9T.......?I...2ZUg_I.....fE6....ONS5UUKS?1DUXTCR.NFO<1V1 S51+KSMODU9.CRW.FOS.V1Nv51U&SM1`U9T=RWN.2\>..:F..KSM1D`..s.:.....a....@.5./....0....C..>>.9.yv..]../..C.9Qm..T0P5KQ25VGnCz...uAVSKDHW2Z.@...j.k..l...#....).*1NS51U.SM.DU9..R.NFO.1.1..51U.M.D.9...W
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.052376708527746
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:shipping advice.exe
                          File size:1'180'160 bytes
                          MD5:1e158beaa852a13274b19effe4a010d9
                          SHA1:1d86155b0195a451e36a3d49cd098fba4bf6da23
                          SHA256:d54abd6ac9348ed05c33f77ae723cb262bd89fcce7d4d449f16b31ed01f401f4
                          SHA512:908087959e31b423b1cc235482931cab5dc8c561b8192e1fca08440af95d12c7bd7db943e3ed3df19e79937ed0e8d347949c23eeb50a3d155357076eee5701ea
                          SSDEEP:24576:dqDEvCTbMWu7rQYlBQcBiT6rprG8aKsYyfETeX1oN:dTvC/MTQYxsWR7aKsYyfRX
                          TLSH:AD45BF0273D1D022FFAB92334B5AF6515BBC69260123E62F13981D79BD701B1563E7A3
                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                          Icon Hash:aaf3e3e3938382a0
                          Entrypoint:0x420577
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66C51667 [Tue Aug 20 22:19:19 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:948cc502fe9226992dce9417f952fce3
                          Instruction
                          call 00007F0F94C1ADE3h
                          jmp 00007F0F94C1A6EFh
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F0F94C1A8CDh
                          mov dword ptr [esi], 0049FDF0h
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FDF8h
                          mov dword ptr [ecx], 0049FDF0h
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F0F94C1A89Ah
                          mov dword ptr [esi], 0049FE0Ch
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FE14h
                          mov dword ptr [ecx], 0049FE0Ch
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          and dword ptr [eax], 00000000h
                          and dword ptr [eax+04h], 00000000h
                          push eax
                          mov eax, dword ptr [ebp+08h]
                          add eax, 04h
                          push eax
                          call 00007F0F94C1D48Dh
                          pop ecx
                          pop ecx
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          lea eax, dword ptr [ecx+04h]
                          mov dword ptr [ecx], 0049FDD0h
                          push eax
                          call 00007F0F94C1D4D8h
                          pop ecx
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          push eax
                          call 00007F0F94C1D4C1h
                          test byte ptr [ebp+08h], 00000001h
                          pop ecx
                          Programming Language:
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x49798.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x11e0000x7594.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xd40000x497980x49800489832914461dee0cb9d401d837fe2ecFalse0.9110265199829932data7.853765676421722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x11e0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                          RT_RCDATA0xdc7b80x40a60data1.0003436555891239
                          RT_GROUP_ICON0x11d2180x76dataEnglishGreat Britain0.6610169491525424
                          RT_GROUP_ICON0x11d2900x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0x11d2a40x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0x11d2b80x14dataEnglishGreat Britain1.25
                          RT_VERSION0x11d2cc0xdcdataEnglishGreat Britain0.6181818181818182
                          RT_MANIFEST0x11d3a80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                          DLLImport
                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                          PSAPI.DLLGetProcessMemoryInfo
                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                          UxTheme.dllIsThemeActive
                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                          2024-08-21T14:36:09.545560+0200TCP2030171ET MALWARE AgentTesla Exfil Via SMTP149725587192.168.2.5162.251.80.30
                          2024-08-21T14:36:09.545560+0200TCP2839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity149725587192.168.2.5162.251.80.30
                          2024-08-21T14:36:09.545560+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2149725587192.168.2.5162.251.80.30
                          2024-08-21T14:36:19.603509+0200TCP2855245ETPRO MALWARE Agent Tesla Exfil via SMTP149725587192.168.2.5162.251.80.30
                          2024-08-21T14:36:19.603509+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity149725587192.168.2.5162.251.80.30
                          TimestampSource PortDest PortSource IPDest IP
                          Aug 21, 2024 14:36:17.696584940 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:17.702056885 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:17.702146053 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:18.379688978 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.380633116 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:18.386451960 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.544015884 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.545090914 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:18.557373047 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.740688086 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.741746902 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:18.747117996 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.924937963 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:18.925688982 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:18.930633068 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.091636896 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.091849089 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.096683979 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.431991100 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.432231903 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.437509060 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.602669954 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.603393078 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.603508949 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.603508949 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.603508949 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:36:19.608385086 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.608403921 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.608632088 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.609667063 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.880498886 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:36:19.924702883 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:37:57.393364906 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:37:57.401278973 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:37:57.762455940 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:37:57.762653112 CEST58749725162.251.80.30192.168.2.5
                          Aug 21, 2024 14:37:57.762725115 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:37:57.762809038 CEST49725587192.168.2.5162.251.80.30
                          Aug 21, 2024 14:37:57.769684076 CEST58749725162.251.80.30192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Aug 21, 2024 14:36:17.373006105 CEST5909053192.168.2.51.1.1.1
                          Aug 21, 2024 14:36:17.688966990 CEST53590901.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Aug 21, 2024 14:36:17.373006105 CEST192.168.2.51.1.1.10x23ccStandard query (0)mail.thelamalab.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Aug 21, 2024 14:36:11.177289963 CEST1.1.1.1192.168.2.50x579dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                          Aug 21, 2024 14:36:11.177289963 CEST1.1.1.1192.168.2.50x579dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                          Aug 21, 2024 14:36:17.688966990 CEST1.1.1.1192.168.2.50x23ccNo error (0)mail.thelamalab.com162.251.80.30A (IP address)IN (0x0001)false
                          TimestampSource PortDest PortSource IPDest IPCommands
                          Aug 21, 2024 14:36:18.379688978 CEST58749725162.251.80.30192.168.2.5220-md-114.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 21 Aug 2024 18:06:18 +0530
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Aug 21, 2024 14:36:18.380633116 CEST49725587192.168.2.5162.251.80.30EHLO 813848
                          Aug 21, 2024 14:36:18.544015884 CEST58749725162.251.80.30192.168.2.5250-md-114.webhostbox.net Hello 813848 [8.46.123.33]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Aug 21, 2024 14:36:18.545090914 CEST49725587192.168.2.5162.251.80.30AUTH login YmlsbGluZ0B0aGVsYW1hbGFiLmNvbQ==
                          Aug 21, 2024 14:36:18.740688086 CEST58749725162.251.80.30192.168.2.5334 UGFzc3dvcmQ6
                          Aug 21, 2024 14:36:18.924937963 CEST58749725162.251.80.30192.168.2.5235 Authentication succeeded
                          Aug 21, 2024 14:36:18.925688982 CEST49725587192.168.2.5162.251.80.30MAIL FROM:<billing@thelamalab.com>
                          Aug 21, 2024 14:36:19.091636896 CEST58749725162.251.80.30192.168.2.5250 OK
                          Aug 21, 2024 14:36:19.091849089 CEST49725587192.168.2.5162.251.80.30RCPT TO:<jinhux31@gmail.com>
                          Aug 21, 2024 14:36:19.431991100 CEST58749725162.251.80.30192.168.2.5250 Accepted
                          Aug 21, 2024 14:36:19.432231903 CEST49725587192.168.2.5162.251.80.30DATA
                          Aug 21, 2024 14:36:19.602669954 CEST58749725162.251.80.30192.168.2.5354 Enter message, ending with "." on a line by itself
                          Aug 21, 2024 14:36:19.603508949 CEST49725587192.168.2.5162.251.80.30.
                          Aug 21, 2024 14:36:19.880498886 CEST58749725162.251.80.30192.168.2.5250 OK id=1sgkZX-00262b-1g
                          Aug 21, 2024 14:37:57.393364906 CEST49725587192.168.2.5162.251.80.30QUIT
                          Aug 21, 2024 14:37:57.762455940 CEST58749725162.251.80.30192.168.2.5221 md-114.webhostbox.net closing connection

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:36:13
                          Start date:21/08/2024
                          Path:C:\Users\user\Desktop\shipping advice.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\shipping advice.exe"
                          Imagebase:0x850000
                          File size:1'180'160 bytes
                          MD5 hash:1E158BEAA852A13274B19EFFE4A010D9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2200845416.0000000001BF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low
                          Has exited:true

                          Target ID:2
                          Start time:08:36:14
                          Start date:21/08/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\shipping advice.exe"
                          Imagebase:0xe0000
                          File size:45'984 bytes
                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3424070590.0000000002466000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3424070590.000000000245E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3423328279.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3424070590.0000000002411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3424070590.0000000002411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:3%
                            Dynamic/Decrypted Code Coverage:0.9%
                            Signature Coverage:3.1%
                            Total number of Nodes:1921
                            Total number of Limit Nodes:54
                            execution_graph 97166 851044 97171 8510f3 97166->97171 97168 85104a 97207 8700a3 29 API calls __onexit 97168->97207 97170 851054 97208 851398 97171->97208 97175 85116a 97218 85a961 97175->97218 97178 85a961 22 API calls 97179 85117e 97178->97179 97180 85a961 22 API calls 97179->97180 97181 851188 97180->97181 97182 85a961 22 API calls 97181->97182 97183 8511c6 97182->97183 97184 85a961 22 API calls 97183->97184 97185 851292 97184->97185 97223 85171c 97185->97223 97189 8512c4 97190 85a961 22 API calls 97189->97190 97191 8512ce 97190->97191 97244 861940 97191->97244 97193 8512f9 97254 851aab 97193->97254 97195 851315 97196 851325 GetStdHandle 97195->97196 97197 892485 97196->97197 97198 85137a 97196->97198 97197->97198 97199 89248e 97197->97199 97201 851387 OleInitialize 97198->97201 97261 86fddb 97199->97261 97201->97168 97202 892495 97271 8c011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97202->97271 97204 89249e 97272 8c0944 CreateThread 97204->97272 97206 8924aa CloseHandle 97206->97198 97207->97170 97273 8513f1 97208->97273 97211 8513f1 22 API calls 97212 8513d0 97211->97212 97213 85a961 22 API calls 97212->97213 97214 8513dc 97213->97214 97280 856b57 97214->97280 97216 851129 97217 851bc3 6 API calls 97216->97217 97217->97175 97219 86fe0b 22 API calls 97218->97219 97220 85a976 97219->97220 97221 86fddb 22 API calls 97220->97221 97222 851174 97221->97222 97222->97178 97224 85a961 22 API calls 97223->97224 97225 85172c 97224->97225 97226 85a961 22 API calls 97225->97226 97227 851734 97226->97227 97228 85a961 22 API calls 97227->97228 97229 85174f 97228->97229 97230 86fddb 22 API calls 97229->97230 97231 85129c 97230->97231 97232 851b4a 97231->97232 97233 851b58 97232->97233 97234 85a961 22 API calls 97233->97234 97235 851b63 97234->97235 97236 85a961 22 API calls 97235->97236 97237 851b6e 97236->97237 97238 85a961 22 API calls 97237->97238 97239 851b79 97238->97239 97240 85a961 22 API calls 97239->97240 97241 851b84 97240->97241 97242 86fddb 22 API calls 97241->97242 97243 851b96 RegisterWindowMessageW 97242->97243 97243->97189 97245 861981 97244->97245 97246 86195d 97244->97246 97325 870242 5 API calls __Init_thread_wait 97245->97325 97253 86196e 97246->97253 97327 870242 5 API calls __Init_thread_wait 97246->97327 97249 86198b 97249->97246 97326 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97249->97326 97250 868727 97250->97253 97328 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97250->97328 97253->97193 97255 89272d 97254->97255 97256 851abb 97254->97256 97329 8c3209 23 API calls 97255->97329 97258 86fddb 22 API calls 97256->97258 97260 851ac3 97258->97260 97259 892738 97260->97195 97263 86fde0 97261->97263 97262 87ea0c ___std_exception_copy 21 API calls 97262->97263 97263->97262 97264 86fdfa 97263->97264 97268 86fdfc 97263->97268 97330 874ead 7 API calls 2 library calls 97263->97330 97264->97202 97266 87066d 97332 8732a4 RaiseException 97266->97332 97268->97266 97331 8732a4 RaiseException 97268->97331 97269 87068a 97269->97202 97271->97204 97272->97206 97333 8c092a 28 API calls 97272->97333 97274 85a961 22 API calls 97273->97274 97275 8513fc 97274->97275 97276 85a961 22 API calls 97275->97276 97277 851404 97276->97277 97278 85a961 22 API calls 97277->97278 97279 8513c6 97278->97279 97279->97211 97281 856b67 _wcslen 97280->97281 97282 894ba1 97280->97282 97285 856ba2 97281->97285 97286 856b7d 97281->97286 97303 8593b2 97282->97303 97284 894baa 97284->97284 97287 86fddb 22 API calls 97285->97287 97292 856f34 22 API calls 97286->97292 97290 856bae 97287->97290 97289 856b85 __fread_nolock 97289->97216 97293 86fe0b 97290->97293 97292->97289 97295 86fddb 97293->97295 97296 86fdfa 97295->97296 97298 86fdfc 97295->97298 97307 87ea0c 97295->97307 97314 874ead 7 API calls 2 library calls 97295->97314 97296->97289 97299 87066d 97298->97299 97315 8732a4 RaiseException 97298->97315 97316 8732a4 RaiseException 97299->97316 97301 87068a 97301->97289 97304 8593c0 97303->97304 97306 8593c9 __fread_nolock 97303->97306 97304->97306 97319 85aec9 97304->97319 97306->97284 97312 883820 __FrameHandler3::FrameUnwindToState 97307->97312 97308 88385e 97318 87f2d9 20 API calls __dosmaperr 97308->97318 97310 883849 RtlAllocateHeap 97311 88385c 97310->97311 97310->97312 97311->97295 97312->97308 97312->97310 97317 874ead 7 API calls 2 library calls 97312->97317 97314->97295 97315->97299 97316->97301 97317->97312 97318->97311 97320 85aedc 97319->97320 97324 85aed9 __fread_nolock 97319->97324 97321 86fddb 22 API calls 97320->97321 97322 85aee7 97321->97322 97323 86fe0b 22 API calls 97322->97323 97323->97324 97324->97306 97325->97249 97326->97246 97327->97250 97328->97253 97329->97259 97330->97263 97331->97266 97332->97269 97334 852de3 97335 852df0 __wsopen_s 97334->97335 97336 892c2b ___scrt_fastfail 97335->97336 97337 852e09 97335->97337 97340 892c47 GetOpenFileNameW 97336->97340 97350 853aa2 97337->97350 97342 892c96 97340->97342 97344 856b57 22 API calls 97342->97344 97346 892cab 97344->97346 97346->97346 97347 852e27 97378 8544a8 97347->97378 97407 891f50 97350->97407 97353 853ace 97355 856b57 22 API calls 97353->97355 97354 853ae9 97413 85a6c3 97354->97413 97357 853ada 97355->97357 97409 8537a0 97357->97409 97360 852da5 97361 891f50 __wsopen_s 97360->97361 97362 852db2 GetLongPathNameW 97361->97362 97363 856b57 22 API calls 97362->97363 97364 852dda 97363->97364 97365 853598 97364->97365 97366 85a961 22 API calls 97365->97366 97367 8535aa 97366->97367 97368 853aa2 23 API calls 97367->97368 97369 8535b5 97368->97369 97370 8932eb 97369->97370 97371 8535c0 97369->97371 97375 89330d 97370->97375 97431 86ce60 41 API calls 97370->97431 97419 85515f 97371->97419 97377 8535df 97377->97347 97432 854ecb 97378->97432 97381 893833 97454 8c2cf9 97381->97454 97383 854ecb 94 API calls 97384 8544e1 97383->97384 97384->97381 97386 8544e9 97384->97386 97385 893848 97387 893869 97385->97387 97388 89384c 97385->97388 97389 8544f5 97386->97389 97390 893854 97386->97390 97392 86fe0b 22 API calls 97387->97392 97495 854f39 97388->97495 97494 85940c 136 API calls 2 library calls 97389->97494 97501 8bda5a 82 API calls 97390->97501 97404 8938ae 97392->97404 97395 852e31 97396 893862 97396->97387 97397 854f39 68 API calls 97400 893a5f 97397->97400 97400->97397 97505 8b989b 82 API calls __wsopen_s 97400->97505 97403 859cb3 22 API calls 97403->97404 97404->97400 97404->97403 97480 85a4a1 97404->97480 97488 853ff7 97404->97488 97502 8b967e 22 API calls __fread_nolock 97404->97502 97503 8b95ad 42 API calls _wcslen 97404->97503 97504 8c0b5a 22 API calls 97404->97504 97408 853aaf GetFullPathNameW 97407->97408 97408->97353 97408->97354 97410 8537ae 97409->97410 97411 8593b2 22 API calls 97410->97411 97412 852e12 97411->97412 97412->97360 97414 85a6dd 97413->97414 97418 85a6d0 97413->97418 97415 86fddb 22 API calls 97414->97415 97416 85a6e7 97415->97416 97417 86fe0b 22 API calls 97416->97417 97417->97418 97418->97357 97420 85516e 97419->97420 97421 85518f __fread_nolock 97419->97421 97424 86fe0b 22 API calls 97420->97424 97422 86fddb 22 API calls 97421->97422 97423 8535cc 97422->97423 97425 8535f3 97423->97425 97424->97421 97426 853605 97425->97426 97430 853624 __fread_nolock 97425->97430 97429 86fe0b 22 API calls 97426->97429 97427 86fddb 22 API calls 97428 85363b 97427->97428 97428->97377 97429->97430 97430->97427 97431->97370 97506 854e90 LoadLibraryA 97432->97506 97437 854ef6 LoadLibraryExW 97514 854e59 LoadLibraryA 97437->97514 97438 893ccf 97439 854f39 68 API calls 97438->97439 97441 893cd6 97439->97441 97443 854e59 3 API calls 97441->97443 97445 893cde 97443->97445 97536 8550f5 97445->97536 97446 854f20 97446->97445 97447 854f2c 97446->97447 97449 854f39 68 API calls 97447->97449 97451 8544cd 97449->97451 97451->97381 97451->97383 97453 893d05 97455 8c2d15 97454->97455 97456 85511f 64 API calls 97455->97456 97457 8c2d29 97456->97457 97800 8c2e66 97457->97800 97460 8550f5 40 API calls 97461 8c2d56 97460->97461 97462 8550f5 40 API calls 97461->97462 97463 8c2d66 97462->97463 97464 8550f5 40 API calls 97463->97464 97465 8c2d81 97464->97465 97466 8550f5 40 API calls 97465->97466 97467 8c2d9c 97466->97467 97468 85511f 64 API calls 97467->97468 97469 8c2db3 97468->97469 97470 87ea0c ___std_exception_copy 21 API calls 97469->97470 97471 8c2dba 97470->97471 97472 87ea0c ___std_exception_copy 21 API calls 97471->97472 97473 8c2dc4 97472->97473 97474 8550f5 40 API calls 97473->97474 97475 8c2dd8 97474->97475 97476 8c28fe 27 API calls 97475->97476 97478 8c2dee 97476->97478 97477 8c2d3f 97477->97385 97478->97477 97806 8c22ce 97478->97806 97481 85a4b1 __fread_nolock 97480->97481 97482 85a52b 97480->97482 97483 86fddb 22 API calls 97481->97483 97484 86fe0b 22 API calls 97482->97484 97485 85a4b8 97483->97485 97484->97481 97486 85a4d6 97485->97486 97487 86fddb 22 API calls 97485->97487 97486->97404 97487->97486 97489 85400a 97488->97489 97492 8540ae 97488->97492 97491 86fe0b 22 API calls 97489->97491 97493 85403c 97489->97493 97490 86fddb 22 API calls 97490->97493 97491->97493 97492->97404 97493->97490 97493->97492 97494->97395 97496 854f43 97495->97496 97500 854f4a 97495->97500 97497 87e678 67 API calls 97496->97497 97497->97500 97498 854f59 97498->97390 97499 854f6a FreeLibrary 97499->97498 97500->97498 97500->97499 97501->97396 97502->97404 97503->97404 97504->97404 97505->97400 97507 854ec6 97506->97507 97508 854ea8 GetProcAddress 97506->97508 97511 87e5eb 97507->97511 97509 854eb8 97508->97509 97509->97507 97510 854ebf FreeLibrary 97509->97510 97510->97507 97544 87e52a 97511->97544 97513 854eea 97513->97437 97513->97438 97515 854e8d 97514->97515 97516 854e6e GetProcAddress 97514->97516 97519 854f80 97515->97519 97517 854e7e 97516->97517 97517->97515 97518 854e86 FreeLibrary 97517->97518 97518->97515 97520 86fe0b 22 API calls 97519->97520 97521 854f95 97520->97521 97605 855722 97521->97605 97523 854fa1 __fread_nolock 97524 8550a5 97523->97524 97525 893d1d 97523->97525 97535 854fdc 97523->97535 97608 8542a2 CreateStreamOnHGlobal 97524->97608 97619 8c304d 74 API calls 97525->97619 97528 893d22 97530 85511f 64 API calls 97528->97530 97529 8550f5 40 API calls 97529->97535 97531 893d45 97530->97531 97532 8550f5 40 API calls 97531->97532 97533 85506e ISource 97532->97533 97533->97446 97535->97528 97535->97529 97535->97533 97614 85511f 97535->97614 97537 855107 97536->97537 97538 893d70 97536->97538 97641 87e8c4 97537->97641 97541 8c28fe 97783 8c274e 97541->97783 97543 8c2919 97543->97453 97547 87e536 __FrameHandler3::FrameUnwindToState 97544->97547 97545 87e544 97569 87f2d9 20 API calls __dosmaperr 97545->97569 97547->97545 97549 87e574 97547->97549 97548 87e549 97570 8827ec 26 API calls ___std_exception_copy 97548->97570 97551 87e586 97549->97551 97552 87e579 97549->97552 97561 888061 97551->97561 97571 87f2d9 20 API calls __dosmaperr 97552->97571 97555 87e58f 97556 87e595 97555->97556 97557 87e5a2 97555->97557 97572 87f2d9 20 API calls __dosmaperr 97556->97572 97573 87e5d4 LeaveCriticalSection __fread_nolock 97557->97573 97558 87e554 __wsopen_s 97558->97513 97562 88806d __FrameHandler3::FrameUnwindToState 97561->97562 97574 882f5e EnterCriticalSection 97562->97574 97564 88807b 97575 8880fb 97564->97575 97568 8880ac __wsopen_s 97568->97555 97569->97548 97570->97558 97571->97558 97572->97558 97573->97558 97574->97564 97584 88811e 97575->97584 97576 888177 97594 884c7d 20 API calls 2 library calls 97576->97594 97577 888088 97589 8880b7 97577->97589 97579 888180 97595 8829c8 97579->97595 97582 888189 97582->97577 97601 883405 11 API calls 2 library calls 97582->97601 97584->97576 97584->97577 97592 87918d EnterCriticalSection 97584->97592 97593 8791a1 LeaveCriticalSection 97584->97593 97585 8881a8 97602 87918d EnterCriticalSection 97585->97602 97588 8881bb 97588->97577 97604 882fa6 LeaveCriticalSection 97589->97604 97591 8880be 97591->97568 97592->97584 97593->97584 97594->97579 97596 8829d3 RtlFreeHeap 97595->97596 97600 8829fc _free 97595->97600 97597 8829e8 97596->97597 97596->97600 97603 87f2d9 20 API calls __dosmaperr 97597->97603 97599 8829ee GetLastError 97599->97600 97600->97582 97601->97585 97602->97588 97603->97599 97604->97591 97606 86fddb 22 API calls 97605->97606 97607 855734 97606->97607 97607->97523 97609 8542bc FindResourceExW 97608->97609 97613 8542d9 97608->97613 97610 8935ba LoadResource 97609->97610 97609->97613 97611 8935cf SizeofResource 97610->97611 97610->97613 97612 8935e3 LockResource 97611->97612 97611->97613 97612->97613 97613->97535 97615 893d90 97614->97615 97616 85512e 97614->97616 97620 87ece3 97616->97620 97619->97528 97623 87eaaa 97620->97623 97622 85513c 97622->97535 97625 87eab6 __FrameHandler3::FrameUnwindToState 97623->97625 97624 87eac2 97636 87f2d9 20 API calls __dosmaperr 97624->97636 97625->97624 97626 87eae8 97625->97626 97638 87918d EnterCriticalSection 97626->97638 97628 87eac7 97637 8827ec 26 API calls ___std_exception_copy 97628->97637 97631 87eaf4 97639 87ec0a 62 API calls 2 library calls 97631->97639 97633 87eb08 97640 87eb27 LeaveCriticalSection __fread_nolock 97633->97640 97635 87ead2 __wsopen_s 97635->97622 97636->97628 97637->97635 97638->97631 97639->97633 97640->97635 97644 87e8e1 97641->97644 97643 855118 97643->97541 97645 87e8ed __FrameHandler3::FrameUnwindToState 97644->97645 97646 87e900 ___scrt_fastfail 97645->97646 97647 87e92d 97645->97647 97648 87e925 __wsopen_s 97645->97648 97671 87f2d9 20 API calls __dosmaperr 97646->97671 97657 87918d EnterCriticalSection 97647->97657 97648->97643 97650 87e937 97658 87e6f8 97650->97658 97652 87e91a 97672 8827ec 26 API calls ___std_exception_copy 97652->97672 97657->97650 97661 87e70a ___scrt_fastfail 97658->97661 97664 87e727 97658->97664 97659 87e717 97746 87f2d9 20 API calls __dosmaperr 97659->97746 97661->97659 97661->97664 97666 87e76a __fread_nolock 97661->97666 97662 87e71c 97747 8827ec 26 API calls ___std_exception_copy 97662->97747 97673 87e96c LeaveCriticalSection __fread_nolock 97664->97673 97665 87e886 ___scrt_fastfail 97749 87f2d9 20 API calls __dosmaperr 97665->97749 97666->97664 97666->97665 97674 87d955 97666->97674 97681 888d45 97666->97681 97748 87cf78 26 API calls 4 library calls 97666->97748 97671->97652 97672->97648 97673->97648 97675 87d976 97674->97675 97676 87d961 97674->97676 97675->97666 97750 87f2d9 20 API calls __dosmaperr 97676->97750 97678 87d966 97751 8827ec 26 API calls ___std_exception_copy 97678->97751 97680 87d971 97680->97666 97682 888d57 97681->97682 97685 888d6f 97681->97685 97761 87f2c6 20 API calls __dosmaperr 97682->97761 97684 8890d9 97777 87f2c6 20 API calls __dosmaperr 97684->97777 97685->97684 97690 888db4 97685->97690 97686 888d5c 97762 87f2d9 20 API calls __dosmaperr 97686->97762 97689 8890de 97778 87f2d9 20 API calls __dosmaperr 97689->97778 97692 888dbf 97690->97692 97695 888d64 97690->97695 97697 888def 97690->97697 97763 87f2c6 20 API calls __dosmaperr 97692->97763 97693 888dcc 97779 8827ec 26 API calls ___std_exception_copy 97693->97779 97695->97666 97696 888dc4 97764 87f2d9 20 API calls __dosmaperr 97696->97764 97700 888e08 97697->97700 97701 888e4a 97697->97701 97702 888e2e 97697->97702 97700->97702 97706 888e15 97700->97706 97768 883820 21 API calls 2 library calls 97701->97768 97765 87f2c6 20 API calls __dosmaperr 97702->97765 97705 888e33 97766 87f2d9 20 API calls __dosmaperr 97705->97766 97752 88f89b 97706->97752 97707 888e61 97710 8829c8 _free 20 API calls 97707->97710 97713 888e6a 97710->97713 97711 888e3a 97767 8827ec 26 API calls ___std_exception_copy 97711->97767 97712 888fb3 97715 889029 97712->97715 97718 888fcc GetConsoleMode 97712->97718 97716 8829c8 _free 20 API calls 97713->97716 97717 88902d ReadFile 97715->97717 97719 888e71 97716->97719 97720 8890a1 GetLastError 97717->97720 97721 889047 97717->97721 97718->97715 97722 888fdd 97718->97722 97723 888e7b 97719->97723 97724 888e96 97719->97724 97725 8890ae 97720->97725 97726 889005 97720->97726 97721->97720 97727 88901e 97721->97727 97722->97717 97728 888fe3 ReadConsoleW 97722->97728 97769 87f2d9 20 API calls __dosmaperr 97723->97769 97771 889424 28 API calls __wsopen_s 97724->97771 97775 87f2d9 20 API calls __dosmaperr 97725->97775 97743 888e45 __fread_nolock 97726->97743 97772 87f2a3 20 API calls 2 library calls 97726->97772 97739 88906c 97727->97739 97740 889083 97727->97740 97727->97743 97728->97727 97733 888fff GetLastError 97728->97733 97729 8829c8 _free 20 API calls 97729->97695 97733->97726 97735 888e80 97770 87f2c6 20 API calls __dosmaperr 97735->97770 97736 8890b3 97776 87f2c6 20 API calls __dosmaperr 97736->97776 97773 888a61 31 API calls 4 library calls 97739->97773 97741 88909a 97740->97741 97740->97743 97774 8888a1 29 API calls __wsopen_s 97741->97774 97743->97729 97745 88909f 97745->97743 97746->97662 97747->97664 97748->97666 97749->97662 97750->97678 97751->97680 97753 88f8a8 97752->97753 97754 88f8b5 97752->97754 97780 87f2d9 20 API calls __dosmaperr 97753->97780 97756 88f8c1 97754->97756 97781 87f2d9 20 API calls __dosmaperr 97754->97781 97756->97712 97758 88f8ad 97758->97712 97759 88f8e2 97782 8827ec 26 API calls ___std_exception_copy 97759->97782 97761->97686 97762->97695 97763->97696 97764->97693 97765->97705 97766->97711 97767->97743 97768->97707 97769->97735 97770->97743 97771->97706 97772->97743 97773->97743 97774->97745 97775->97736 97776->97743 97777->97689 97778->97693 97779->97695 97780->97758 97781->97759 97782->97758 97786 87e4e8 97783->97786 97785 8c275d 97785->97543 97789 87e469 97786->97789 97788 87e505 97788->97785 97790 87e478 97789->97790 97792 87e48c 97789->97792 97797 87f2d9 20 API calls __dosmaperr 97790->97797 97796 87e488 __alldvrm 97792->97796 97799 88333f 11 API calls 2 library calls 97792->97799 97793 87e47d 97798 8827ec 26 API calls ___std_exception_copy 97793->97798 97796->97788 97797->97793 97798->97796 97799->97796 97805 8c2e7a 97800->97805 97801 8550f5 40 API calls 97801->97805 97802 8c2d3b 97802->97460 97802->97477 97803 8c28fe 27 API calls 97803->97805 97804 85511f 64 API calls 97804->97805 97805->97801 97805->97802 97805->97803 97805->97804 97807 8c22e7 97806->97807 97808 8c22d9 97806->97808 97810 8c232c 97807->97810 97811 87e5eb 29 API calls 97807->97811 97822 8c22f0 97807->97822 97809 87e5eb 29 API calls 97808->97809 97809->97807 97835 8c2557 97810->97835 97812 8c2311 97811->97812 97812->97810 97814 8c231a 97812->97814 97819 87e678 67 API calls 97814->97819 97814->97822 97815 8c2370 97816 8c2374 97815->97816 97817 8c2395 97815->97817 97818 8c2381 97816->97818 97821 87e678 67 API calls 97816->97821 97839 8c2171 97817->97839 97818->97822 97824 87e678 67 API calls 97818->97824 97819->97822 97821->97818 97822->97477 97823 8c239d 97825 8c23c3 97823->97825 97826 8c23a3 97823->97826 97824->97822 97846 8c23f3 97825->97846 97828 8c23b0 97826->97828 97829 87e678 67 API calls 97826->97829 97828->97822 97830 87e678 67 API calls 97828->97830 97829->97828 97830->97822 97831 8c23ca 97833 8c23de 97831->97833 97854 87e678 97831->97854 97833->97822 97834 87e678 67 API calls 97833->97834 97834->97822 97836 8c257c 97835->97836 97838 8c2565 __fread_nolock 97835->97838 97837 87e8c4 __fread_nolock 40 API calls 97836->97837 97837->97838 97838->97815 97840 87ea0c ___std_exception_copy 21 API calls 97839->97840 97841 8c217f 97840->97841 97842 87ea0c ___std_exception_copy 21 API calls 97841->97842 97843 8c2190 97842->97843 97844 87ea0c ___std_exception_copy 21 API calls 97843->97844 97845 8c219c 97844->97845 97845->97823 97851 8c2408 97846->97851 97847 8c24c0 97871 8c2724 97847->97871 97848 8c21cc 40 API calls 97848->97851 97850 8c24c7 97850->97831 97851->97847 97851->97848 97851->97850 97867 8c2606 97851->97867 97875 8c2269 40 API calls 97851->97875 97855 87e684 __FrameHandler3::FrameUnwindToState 97854->97855 97856 87e695 97855->97856 97857 87e6aa 97855->97857 97928 87f2d9 20 API calls __dosmaperr 97856->97928 97859 87e6a5 __wsopen_s 97857->97859 97911 87918d EnterCriticalSection 97857->97911 97859->97833 97861 87e69a 97929 8827ec 26 API calls ___std_exception_copy 97861->97929 97862 87e6c6 97912 87e602 97862->97912 97865 87e6d1 97930 87e6ee LeaveCriticalSection __fread_nolock 97865->97930 97868 8c2617 97867->97868 97869 8c261d 97867->97869 97868->97869 97876 8c26d7 97868->97876 97869->97851 97872 8c2742 97871->97872 97873 8c2731 97871->97873 97872->97850 97874 87dbb3 65 API calls 97873->97874 97874->97872 97875->97851 97877 8c2714 97876->97877 97878 8c2703 97876->97878 97877->97868 97880 87dbb3 97878->97880 97881 87dbc1 97880->97881 97882 87dbdd 97880->97882 97881->97882 97883 87dbe3 97881->97883 97884 87dbcd 97881->97884 97882->97877 97889 87d9cc 97883->97889 97892 87f2d9 20 API calls __dosmaperr 97884->97892 97887 87dbd2 97893 8827ec 26 API calls ___std_exception_copy 97887->97893 97894 87d97b 97889->97894 97891 87d9f0 97891->97882 97892->97887 97893->97882 97895 87d987 __FrameHandler3::FrameUnwindToState 97894->97895 97902 87918d EnterCriticalSection 97895->97902 97897 87d995 97903 87d9f4 97897->97903 97901 87d9b3 __wsopen_s 97901->97891 97902->97897 97904 8849a1 27 API calls 97903->97904 97905 87da09 97904->97905 97906 87da3a 62 API calls 97905->97906 97907 87da24 97906->97907 97908 884a56 62 API calls 97907->97908 97909 87d9a2 97908->97909 97910 87d9c0 LeaveCriticalSection __fread_nolock 97909->97910 97910->97901 97911->97862 97913 87e624 97912->97913 97914 87e60f 97912->97914 97919 87e61f 97913->97919 97931 87dc0b 97913->97931 97956 87f2d9 20 API calls __dosmaperr 97914->97956 97916 87e614 97957 8827ec 26 API calls ___std_exception_copy 97916->97957 97919->97865 97923 87d955 __fread_nolock 26 API calls 97924 87e646 97923->97924 97941 88862f 97924->97941 97927 8829c8 _free 20 API calls 97927->97919 97928->97861 97929->97859 97930->97859 97932 87dc23 97931->97932 97933 87dc1f 97931->97933 97932->97933 97934 87d955 __fread_nolock 26 API calls 97932->97934 97937 884d7a 97933->97937 97935 87dc43 97934->97935 97958 8859be 97935->97958 97938 884d90 97937->97938 97940 87e640 97937->97940 97939 8829c8 _free 20 API calls 97938->97939 97938->97940 97939->97940 97940->97923 97942 88863e 97941->97942 97943 888653 97941->97943 98081 87f2c6 20 API calls __dosmaperr 97942->98081 97944 88868e 97943->97944 97948 88867a 97943->97948 98083 87f2c6 20 API calls __dosmaperr 97944->98083 97947 888643 98082 87f2d9 20 API calls __dosmaperr 97947->98082 98078 888607 97948->98078 97949 888693 98084 87f2d9 20 API calls __dosmaperr 97949->98084 97953 87e64c 97953->97919 97953->97927 97954 88869b 98085 8827ec 26 API calls ___std_exception_copy 97954->98085 97956->97916 97957->97919 97959 8859ca __FrameHandler3::FrameUnwindToState 97958->97959 97960 8859ea 97959->97960 97961 8859d2 97959->97961 97962 885a88 97960->97962 97967 885a1f 97960->97967 98037 87f2c6 20 API calls __dosmaperr 97961->98037 98042 87f2c6 20 API calls __dosmaperr 97962->98042 97965 8859d7 98038 87f2d9 20 API calls __dosmaperr 97965->98038 97966 885a8d 98043 87f2d9 20 API calls __dosmaperr 97966->98043 97983 885147 EnterCriticalSection 97967->97983 97971 885a95 98044 8827ec 26 API calls ___std_exception_copy 97971->98044 97972 885a25 97974 885a41 97972->97974 97975 885a56 97972->97975 98039 87f2d9 20 API calls __dosmaperr 97974->98039 97984 885aa9 97975->97984 97977 8859df __wsopen_s 97977->97933 97979 885a46 98040 87f2c6 20 API calls __dosmaperr 97979->98040 97980 885a51 98041 885a80 LeaveCriticalSection __wsopen_s 97980->98041 97983->97972 97985 885ad7 97984->97985 98022 885ad0 97984->98022 97986 885afa 97985->97986 97987 885adb 97985->97987 97990 885b4b 97986->97990 97991 885b2e 97986->97991 98052 87f2c6 20 API calls __dosmaperr 97987->98052 97994 885b61 97990->97994 98058 889424 28 API calls __wsopen_s 97990->98058 98055 87f2c6 20 API calls __dosmaperr 97991->98055 97992 885cb1 97992->97980 97993 885ae0 98053 87f2d9 20 API calls __dosmaperr 97993->98053 98045 88564e 97994->98045 97998 885ae7 98054 8827ec 26 API calls ___std_exception_copy 97998->98054 98000 885b33 98056 87f2d9 20 API calls __dosmaperr 98000->98056 98004 885ba8 98007 885bbc 98004->98007 98008 885c02 WriteFile 98004->98008 98005 885b6f 98009 885b73 98005->98009 98010 885b95 98005->98010 98006 885b3b 98057 8827ec 26 API calls ___std_exception_copy 98006->98057 98012 885bf2 98007->98012 98013 885bc4 98007->98013 98015 885c25 GetLastError 98008->98015 98021 885b8b 98008->98021 98014 885c69 98009->98014 98059 8855e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 98009->98059 98060 88542e 45 API calls 3 library calls 98010->98060 98063 8856c4 7 API calls 2 library calls 98012->98063 98017 885bc9 98013->98017 98018 885be2 98013->98018 98014->98022 98067 87f2d9 20 API calls __dosmaperr 98014->98067 98015->98021 98017->98014 98023 885bd2 98017->98023 98062 885891 8 API calls 2 library calls 98018->98062 98021->98014 98021->98022 98028 885c45 98021->98028 98069 870a8c 98022->98069 98061 8857a3 7 API calls 2 library calls 98023->98061 98025 885be0 98025->98021 98027 885c8e 98068 87f2c6 20 API calls __dosmaperr 98027->98068 98031 885c4c 98028->98031 98032 885c60 98028->98032 98064 87f2d9 20 API calls __dosmaperr 98031->98064 98066 87f2a3 20 API calls 2 library calls 98032->98066 98035 885c51 98065 87f2c6 20 API calls __dosmaperr 98035->98065 98037->97965 98038->97977 98039->97979 98040->97980 98041->97977 98042->97966 98043->97971 98044->97977 98046 88f89b __fread_nolock 26 API calls 98045->98046 98047 88565e 98046->98047 98048 885663 98047->98048 98076 882d74 38 API calls 3 library calls 98047->98076 98048->98004 98048->98005 98050 885686 98050->98048 98051 8856a4 GetConsoleMode 98050->98051 98051->98048 98052->97993 98053->97998 98054->98022 98055->98000 98056->98006 98057->98022 98058->97994 98059->98021 98060->98021 98061->98025 98062->98025 98063->98025 98064->98035 98065->98022 98066->98022 98067->98027 98068->98022 98070 870a97 IsProcessorFeaturePresent 98069->98070 98071 870a95 98069->98071 98073 870c5d 98070->98073 98071->97992 98077 870c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98073->98077 98075 870d40 98075->97992 98076->98050 98077->98075 98086 888585 98078->98086 98080 88862b 98080->97953 98081->97947 98082->97953 98083->97949 98084->97954 98085->97953 98087 888591 __FrameHandler3::FrameUnwindToState 98086->98087 98097 885147 EnterCriticalSection 98087->98097 98089 88859f 98090 8885d1 98089->98090 98091 8885c6 98089->98091 98113 87f2d9 20 API calls __dosmaperr 98090->98113 98098 8886ae 98091->98098 98094 8885cc 98114 8885fb LeaveCriticalSection __wsopen_s 98094->98114 98096 8885ee __wsopen_s 98096->98080 98097->98089 98115 8853c4 98098->98115 98100 8886c4 98128 885333 21 API calls 3 library calls 98100->98128 98101 8886be 98101->98100 98102 8886f6 98101->98102 98104 8853c4 __wsopen_s 26 API calls 98101->98104 98102->98100 98105 8853c4 __wsopen_s 26 API calls 98102->98105 98107 8886ed 98104->98107 98108 888702 FindCloseChangeNotification 98105->98108 98106 88871c 98109 88873e 98106->98109 98129 87f2a3 20 API calls 2 library calls 98106->98129 98110 8853c4 __wsopen_s 26 API calls 98107->98110 98108->98100 98111 88870e GetLastError 98108->98111 98109->98094 98110->98102 98111->98100 98113->98094 98114->98096 98116 8853d1 98115->98116 98117 8853e6 98115->98117 98118 87f2c6 __dosmaperr 20 API calls 98116->98118 98120 87f2c6 __dosmaperr 20 API calls 98117->98120 98122 88540b 98117->98122 98119 8853d6 98118->98119 98121 87f2d9 _free 20 API calls 98119->98121 98123 885416 98120->98123 98124 8853de 98121->98124 98122->98101 98125 87f2d9 _free 20 API calls 98123->98125 98124->98101 98126 88541e 98125->98126 98127 8827ec ___std_exception_copy 26 API calls 98126->98127 98127->98124 98128->98106 98129->98109 98130 851cad SystemParametersInfoW 98131 8a2a00 98145 85d7b0 ISource 98131->98145 98132 85db11 PeekMessageW 98132->98145 98133 85d807 GetInputState 98133->98132 98133->98145 98135 8a1cbe TranslateAcceleratorW 98135->98145 98136 85da04 timeGetTime 98136->98145 98137 85db73 TranslateMessage DispatchMessageW 98138 85db8f PeekMessageW 98137->98138 98138->98145 98139 85dbaf Sleep 98157 85dbc0 98139->98157 98140 8a2b74 Sleep 98140->98157 98141 86e551 timeGetTime 98141->98157 98142 8a1dda timeGetTime 98313 86e300 23 API calls 98142->98313 98145->98132 98145->98133 98145->98135 98145->98136 98145->98137 98145->98138 98145->98139 98145->98140 98145->98142 98147 85d9d5 98145->98147 98163 85dd50 98145->98163 98170 85dfd0 98145->98170 98198 861310 98145->98198 98254 85bf40 98145->98254 98312 86edf6 IsDialogMessageW GetClassLongW 98145->98312 98314 8c3a2a 23 API calls 98145->98314 98315 85ec40 98145->98315 98339 8c359c 82 API calls __wsopen_s 98145->98339 98146 8a2c0b GetExitCodeProcess 98149 8a2c21 WaitForSingleObject 98146->98149 98150 8a2c37 CloseHandle 98146->98150 98149->98145 98149->98150 98150->98157 98151 8a2a31 98151->98147 98152 8e29bf GetForegroundWindow 98152->98157 98153 8a2ca9 Sleep 98153->98145 98157->98141 98157->98145 98157->98146 98157->98147 98157->98151 98157->98152 98157->98153 98340 8d5658 23 API calls 98157->98340 98341 8be97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98157->98341 98342 8bd4dc 47 API calls 98157->98342 98164 85dd83 98163->98164 98165 85dd6f 98163->98165 98344 8c359c 82 API calls __wsopen_s 98164->98344 98343 85d260 235 API calls 2 library calls 98165->98343 98168 85dd7a 98168->98145 98169 8a2f75 98169->98169 98171 85e010 98170->98171 98172 8a2f7a 98171->98172 98175 85e075 98171->98175 98173 85ec40 235 API calls 98172->98173 98174 8a2f8c 98173->98174 98186 85e0dc ISource 98174->98186 98351 8c359c 82 API calls __wsopen_s 98174->98351 98175->98186 98352 870242 5 API calls __Init_thread_wait 98175->98352 98179 8a2fca 98181 85a961 22 API calls 98179->98181 98179->98186 98180 85a961 22 API calls 98180->98186 98183 8a2fe4 98181->98183 98353 8700a3 29 API calls __onexit 98183->98353 98186->98180 98189 85ec40 235 API calls 98186->98189 98193 8604f0 22 API calls 98186->98193 98194 85e3e1 98186->98194 98195 8c359c 82 API calls 98186->98195 98345 85a8c7 98186->98345 98349 85a81b 41 API calls 98186->98349 98350 86a308 235 API calls 98186->98350 98355 870242 5 API calls __Init_thread_wait 98186->98355 98356 8700a3 29 API calls __onexit 98186->98356 98357 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98186->98357 98358 8d47d4 235 API calls 98186->98358 98359 8d68c1 235 API calls 98186->98359 98188 8a2fee 98354 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98188->98354 98189->98186 98193->98186 98194->98145 98195->98186 98199 861376 98198->98199 98200 8617b0 98198->98200 98202 861390 98199->98202 98203 8a6331 98199->98203 98450 870242 5 API calls __Init_thread_wait 98200->98450 98207 861940 9 API calls 98202->98207 98204 8a633d 98203->98204 98461 8d709c 235 API calls 98203->98461 98204->98145 98206 8617ba 98208 8617fb 98206->98208 98451 859cb3 98206->98451 98209 8613a0 98207->98209 98213 8a6346 98208->98213 98215 86182c 98208->98215 98211 861940 9 API calls 98209->98211 98212 8613b6 98211->98212 98212->98208 98214 8613ec 98212->98214 98462 8c359c 82 API calls __wsopen_s 98213->98462 98214->98213 98238 861408 __fread_nolock 98214->98238 98458 85aceb 23 API calls ISource 98215->98458 98218 861839 98459 86d217 235 API calls 98218->98459 98219 8617d4 98457 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98219->98457 98222 8a636e 98463 8c359c 82 API calls __wsopen_s 98222->98463 98223 86152f 98225 86153c 98223->98225 98226 8a63d1 98223->98226 98228 861940 9 API calls 98225->98228 98465 8d5745 54 API calls _wcslen 98226->98465 98230 861549 98228->98230 98229 86fddb 22 API calls 98229->98238 98231 8a64fa 98230->98231 98234 861940 9 API calls 98230->98234 98242 8a6369 98231->98242 98466 8c359c 82 API calls __wsopen_s 98231->98466 98232 861872 98460 86faeb 23 API calls 98232->98460 98233 86fe0b 22 API calls 98233->98238 98240 861563 98234->98240 98237 85ec40 235 API calls 98237->98238 98238->98218 98238->98222 98238->98223 98238->98229 98238->98233 98238->98237 98239 8a63b2 98238->98239 98238->98242 98464 8c359c 82 API calls __wsopen_s 98239->98464 98240->98231 98243 85a8c7 22 API calls 98240->98243 98245 8615c7 ISource 98240->98245 98242->98145 98243->98245 98244 861940 9 API calls 98244->98245 98245->98231 98245->98232 98245->98242 98245->98244 98247 86167b ISource 98245->98247 98252 854f39 68 API calls 98245->98252 98360 8d959f 98245->98360 98363 8c6ef1 98245->98363 98443 8d958b 98245->98443 98446 8bd4ce 98245->98446 98246 86171d 98246->98145 98247->98246 98449 86ce17 22 API calls ISource 98247->98449 98252->98245 98815 85adf0 98254->98815 98256 85bf9d 98257 8a04b6 98256->98257 98258 85bfa9 98256->98258 98828 8c359c 82 API calls __wsopen_s 98257->98828 98260 8a04c6 98258->98260 98261 85c01e 98258->98261 98829 8c359c 82 API calls __wsopen_s 98260->98829 98820 85ac91 98261->98820 98264 85c7da 98268 86fe0b 22 API calls 98264->98268 98273 85c808 __fread_nolock 98268->98273 98270 8a04f5 98274 8a055a 98270->98274 98830 86d217 235 API calls 98270->98830 98278 86fe0b 22 API calls 98273->98278 98297 85c603 98274->98297 98831 8c359c 82 API calls __wsopen_s 98274->98831 98275 85ec40 235 API calls 98308 85c039 ISource __fread_nolock 98275->98308 98276 8b7120 22 API calls 98276->98308 98277 8a091a 98841 8c3209 23 API calls 98277->98841 98309 85c350 ISource __fread_nolock 98278->98309 98279 85af8a 22 API calls 98279->98308 98282 8a08a5 98283 85ec40 235 API calls 98282->98283 98285 8a08cf 98283->98285 98285->98297 98839 85a81b 41 API calls 98285->98839 98286 8a0591 98832 8c359c 82 API calls __wsopen_s 98286->98832 98287 8a08f6 98840 8c359c 82 API calls __wsopen_s 98287->98840 98292 85bbe0 40 API calls 98292->98308 98294 85c237 98295 85c253 98294->98295 98296 85a8c7 22 API calls 98294->98296 98298 8a0976 98295->98298 98302 85c297 ISource 98295->98302 98296->98295 98297->98145 98842 85aceb 23 API calls ISource 98298->98842 98301 86fddb 22 API calls 98301->98308 98304 8a09bf 98302->98304 98825 85aceb 23 API calls ISource 98302->98825 98304->98297 98843 8c359c 82 API calls __wsopen_s 98304->98843 98305 85c335 98305->98304 98306 85c342 98305->98306 98826 85a704 22 API calls ISource 98306->98826 98308->98264 98308->98270 98308->98273 98308->98274 98308->98275 98308->98276 98308->98277 98308->98279 98308->98282 98308->98286 98308->98287 98308->98292 98308->98294 98308->98297 98308->98301 98308->98304 98310 86fe0b 22 API calls 98308->98310 98824 85ad81 22 API calls 98308->98824 98833 8b7099 22 API calls __fread_nolock 98308->98833 98834 8d5745 54 API calls _wcslen 98308->98834 98835 86aa42 22 API calls ISource 98308->98835 98836 8bf05c 40 API calls 98308->98836 98837 85a993 41 API calls 98308->98837 98838 85aceb 23 API calls ISource 98308->98838 98311 85c3ac 98309->98311 98827 86ce17 22 API calls ISource 98309->98827 98310->98308 98311->98145 98312->98145 98313->98145 98314->98145 98334 85ec76 ISource 98315->98334 98316 870242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98316->98334 98317 8a4beb 98850 8c359c 82 API calls __wsopen_s 98317->98850 98318 86fddb 22 API calls 98318->98334 98319 85fef7 98327 85a8c7 22 API calls 98319->98327 98331 85ed9d ISource 98319->98331 98322 8a4b0b 98848 8c359c 82 API calls __wsopen_s 98322->98848 98323 85f3ae ISource 98323->98331 98847 8c359c 82 API calls __wsopen_s 98323->98847 98324 8a4600 98330 85a8c7 22 API calls 98324->98330 98324->98331 98327->98331 98329 85a8c7 22 API calls 98329->98334 98330->98331 98331->98145 98332 85fbe3 98332->98323 98332->98331 98335 8a4bdc 98332->98335 98333 85a961 22 API calls 98333->98334 98334->98316 98334->98317 98334->98318 98334->98319 98334->98322 98334->98323 98334->98324 98334->98329 98334->98331 98334->98332 98334->98333 98336 8700a3 29 API calls pre_c_initialization 98334->98336 98338 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98334->98338 98845 8601e0 235 API calls 2 library calls 98334->98845 98846 8606a0 41 API calls ISource 98334->98846 98849 8c359c 82 API calls __wsopen_s 98335->98849 98336->98334 98338->98334 98339->98145 98340->98157 98341->98157 98342->98157 98343->98168 98344->98169 98346 85a8db 98345->98346 98348 85a8ea __fread_nolock 98345->98348 98347 86fe0b 22 API calls 98346->98347 98346->98348 98347->98348 98348->98186 98349->98186 98350->98186 98351->98186 98352->98179 98353->98188 98354->98186 98355->98186 98356->98186 98357->98186 98358->98186 98359->98186 98467 8d7f59 98360->98467 98362 8d95af 98362->98245 98364 85a961 22 API calls 98363->98364 98365 8c6f1d 98364->98365 98366 85a961 22 API calls 98365->98366 98367 8c6f26 98366->98367 98368 8c6f3a 98367->98368 98763 85b567 39 API calls 98367->98763 98370 857510 53 API calls 98368->98370 98371 8c6f57 _wcslen 98370->98371 98372 8c6fbc 98371->98372 98373 8c70bf 98371->98373 98384 8c70e9 98371->98384 98375 857510 53 API calls 98372->98375 98374 854ecb 94 API calls 98373->98374 98376 8c70d0 98374->98376 98377 8c6fc8 98375->98377 98378 8c70e5 98376->98378 98380 854ecb 94 API calls 98376->98380 98379 85a8c7 22 API calls 98377->98379 98385 8c6fdb 98377->98385 98381 85a961 22 API calls 98378->98381 98378->98384 98379->98385 98380->98378 98382 8c711a 98381->98382 98383 85a961 22 API calls 98382->98383 98387 8c7126 98383->98387 98384->98245 98386 8c7027 98385->98386 98388 8c7005 98385->98388 98392 85a8c7 22 API calls 98385->98392 98389 857510 53 API calls 98386->98389 98391 85a961 22 API calls 98387->98391 98764 8533c6 98388->98764 98390 8c7034 98389->98390 98394 8c703d 98390->98394 98395 8c7047 98390->98395 98396 8c712f 98391->98396 98392->98388 98398 85a8c7 22 API calls 98394->98398 98773 8be199 GetFileAttributesW 98395->98773 98400 85a961 22 API calls 98396->98400 98397 8c700f 98401 857510 53 API calls 98397->98401 98398->98395 98403 8c7138 98400->98403 98404 8c701b 98401->98404 98402 8c7050 98405 8c7063 98402->98405 98408 854c6d 22 API calls 98402->98408 98406 857510 53 API calls 98403->98406 98407 856350 22 API calls 98404->98407 98410 857510 53 API calls 98405->98410 98415 8c7069 98405->98415 98409 8c7145 98406->98409 98407->98386 98408->98405 98600 85525f 98409->98600 98412 8c70a0 98410->98412 98774 8bd076 57 API calls 98412->98774 98414 8c7166 98642 854c6d 98414->98642 98415->98384 98418 8c71a9 98419 85a8c7 22 API calls 98418->98419 98421 8c71ba 98419->98421 98420 854c6d 22 API calls 98422 8c7186 98420->98422 98645 856350 98421->98645 98422->98418 98424 856b57 22 API calls 98422->98424 98426 8c719b 98424->98426 98428 856b57 22 API calls 98426->98428 98427 856350 22 API calls 98429 8c71d6 98427->98429 98428->98418 98430 856350 22 API calls 98429->98430 98431 8c71e4 98430->98431 98432 857510 53 API calls 98431->98432 98433 8c71f0 98432->98433 98654 8bd7bc 98433->98654 98435 8c7201 98436 8bd4ce 4 API calls 98435->98436 98437 8c720b 98436->98437 98438 857510 53 API calls 98437->98438 98442 8c7239 98437->98442 98439 8c7229 98438->98439 98708 8c2947 98439->98708 98441 854f39 68 API calls 98441->98384 98442->98441 98444 8d7f59 120 API calls 98443->98444 98445 8d959b 98444->98445 98445->98245 98810 8bdbbe lstrlenW 98446->98810 98449->98247 98450->98206 98452 859cc2 _wcslen 98451->98452 98453 86fe0b 22 API calls 98452->98453 98454 859cea __fread_nolock 98453->98454 98455 86fddb 22 API calls 98454->98455 98456 859d00 98455->98456 98456->98219 98457->98208 98458->98218 98459->98232 98460->98232 98461->98204 98462->98242 98463->98242 98464->98242 98465->98240 98466->98242 98505 857510 98467->98505 98471 8d844f 98569 8d8ee4 60 API calls 98471->98569 98474 8d845e 98475 8d846a 98474->98475 98476 8d828f 98474->98476 98484 8d7fd5 ISource 98475->98484 98541 8d7e86 98476->98541 98477 857510 53 API calls 98482 8d8049 98477->98482 98482->98477 98482->98484 98492 8d8281 98482->98492 98560 8b417d 22 API calls __fread_nolock 98482->98560 98561 8d851d 42 API calls _strftime 98482->98561 98483 8d82c8 98556 86fc70 98483->98556 98484->98362 98487 8d82e8 98562 8c359c 82 API calls __wsopen_s 98487->98562 98488 8d8302 98563 8563eb 22 API calls 98488->98563 98491 8d82f3 GetCurrentProcess TerminateProcess 98491->98488 98492->98471 98492->98476 98493 8d8311 98564 856a50 22 API calls 98493->98564 98495 8d832a 98503 8d8352 98495->98503 98565 8604f0 22 API calls 98495->98565 98497 8d84c5 98497->98484 98501 8d84d9 FreeLibrary 98497->98501 98498 8d8341 98566 8d8b7b 75 API calls 98498->98566 98501->98484 98503->98497 98567 8604f0 22 API calls 98503->98567 98568 85aceb 23 API calls ISource 98503->98568 98570 8d8b7b 75 API calls 98503->98570 98506 857525 98505->98506 98521 857522 98505->98521 98507 85752d 98506->98507 98508 85755b 98506->98508 98571 8751c6 26 API calls 98507->98571 98511 85756d 98508->98511 98515 89500f 98508->98515 98519 8950f6 98508->98519 98572 86fb21 51 API calls 98511->98572 98512 85753d 98517 86fddb 22 API calls 98512->98517 98513 89510e 98513->98513 98522 86fe0b 22 API calls 98515->98522 98523 895088 98515->98523 98518 857547 98517->98518 98520 859cb3 22 API calls 98518->98520 98574 875183 26 API calls 98519->98574 98520->98521 98521->98484 98528 8d8cd3 98521->98528 98524 895058 98522->98524 98573 86fb21 51 API calls 98523->98573 98525 86fddb 22 API calls 98524->98525 98526 89507f 98525->98526 98527 859cb3 22 API calls 98526->98527 98527->98523 98529 85aec9 22 API calls 98528->98529 98530 8d8cee CharLowerBuffW 98529->98530 98575 8b8e54 98530->98575 98534 85a961 22 API calls 98535 8d8d2a 98534->98535 98582 856d25 98535->98582 98537 8d8d3e 98538 8593b2 22 API calls 98537->98538 98540 8d8d48 _wcslen 98538->98540 98539 8d8e5e _wcslen 98539->98482 98540->98539 98595 8d851d 42 API calls _strftime 98540->98595 98542 8d7ea1 98541->98542 98546 8d7eec 98541->98546 98543 86fe0b 22 API calls 98542->98543 98545 8d7ec3 98543->98545 98544 86fddb 22 API calls 98544->98545 98545->98544 98545->98546 98547 8d9096 98546->98547 98548 8d92ab ISource 98547->98548 98555 8d90ba _strcat _wcslen 98547->98555 98548->98483 98549 85b567 39 API calls 98549->98555 98550 85b38f 39 API calls 98550->98555 98551 85b6b5 39 API calls 98551->98555 98552 857510 53 API calls 98552->98555 98553 87ea0c 21 API calls ___std_exception_copy 98553->98555 98555->98548 98555->98549 98555->98550 98555->98551 98555->98552 98555->98553 98599 8befae 24 API calls _wcslen 98555->98599 98557 86fc85 98556->98557 98558 86fd1d VirtualAlloc 98557->98558 98559 86fceb 98557->98559 98558->98559 98559->98487 98559->98488 98560->98482 98561->98482 98562->98491 98563->98493 98564->98495 98565->98498 98566->98503 98567->98503 98568->98503 98569->98474 98570->98503 98571->98512 98572->98512 98573->98519 98574->98513 98576 8b8e74 _wcslen 98575->98576 98577 8b8f63 98576->98577 98580 8b8ea9 98576->98580 98581 8b8f68 98576->98581 98577->98534 98577->98540 98580->98577 98596 86ce60 41 API calls 98580->98596 98581->98577 98597 86ce60 41 API calls 98581->98597 98583 856d34 98582->98583 98584 856d91 98582->98584 98583->98584 98586 856d3f 98583->98586 98585 8593b2 22 API calls 98584->98585 98592 856d62 __fread_nolock 98585->98592 98587 894c9d 98586->98587 98588 856d5a 98586->98588 98589 86fddb 22 API calls 98587->98589 98598 856f34 22 API calls 98588->98598 98591 894ca7 98589->98591 98593 86fe0b 22 API calls 98591->98593 98592->98537 98594 894cda 98593->98594 98595->98539 98596->98580 98597->98581 98598->98592 98599->98555 98601 85a961 22 API calls 98600->98601 98602 855275 98601->98602 98603 85a961 22 API calls 98602->98603 98604 85527d 98603->98604 98605 85a961 22 API calls 98604->98605 98606 855285 98605->98606 98607 85a961 22 API calls 98606->98607 98608 85528d 98607->98608 98609 8552c1 98608->98609 98610 893df5 98608->98610 98612 856d25 22 API calls 98609->98612 98611 85a8c7 22 API calls 98610->98611 98613 893dfe 98611->98613 98614 8552cf 98612->98614 98615 85a6c3 22 API calls 98613->98615 98616 8593b2 22 API calls 98614->98616 98619 855304 98615->98619 98617 8552d9 98616->98617 98617->98619 98620 856d25 22 API calls 98617->98620 98618 855349 98622 856d25 22 API calls 98618->98622 98619->98618 98621 855325 98619->98621 98631 893e20 98619->98631 98623 8552fa 98620->98623 98621->98618 98626 854c6d 22 API calls 98621->98626 98624 85535a 98622->98624 98625 8593b2 22 API calls 98623->98625 98627 855370 98624->98627 98633 85a8c7 22 API calls 98624->98633 98625->98619 98629 855332 98626->98629 98628 855384 98627->98628 98634 85a8c7 22 API calls 98627->98634 98632 85538f 98628->98632 98636 85a8c7 22 API calls 98628->98636 98629->98618 98635 856d25 22 API calls 98629->98635 98630 856b57 22 API calls 98639 893ee0 98630->98639 98631->98630 98637 85a8c7 22 API calls 98632->98637 98641 85539a 98632->98641 98633->98627 98634->98628 98635->98618 98636->98632 98637->98641 98638 854c6d 22 API calls 98638->98639 98639->98618 98639->98638 98775 8549bd 22 API calls __fread_nolock 98639->98775 98641->98414 98643 85aec9 22 API calls 98642->98643 98644 854c78 98643->98644 98644->98418 98644->98420 98646 856362 98645->98646 98647 894a51 98645->98647 98776 856373 98646->98776 98786 854a88 22 API calls __fread_nolock 98647->98786 98650 85636e 98650->98427 98651 894a5b 98652 894a67 98651->98652 98653 85a8c7 22 API calls 98651->98653 98653->98652 98655 8bd7d8 98654->98655 98656 8bd7dd 98655->98656 98657 8bd7f3 98655->98657 98658 8bd7ee 98656->98658 98660 85a8c7 22 API calls 98656->98660 98659 85a961 22 API calls 98657->98659 98658->98435 98661 8bd7fb 98659->98661 98660->98658 98662 85a961 22 API calls 98661->98662 98663 8bd803 98662->98663 98664 85a961 22 API calls 98663->98664 98665 8bd80e 98664->98665 98666 85a961 22 API calls 98665->98666 98667 8bd816 98666->98667 98668 85a961 22 API calls 98667->98668 98669 8bd81e 98668->98669 98670 85a961 22 API calls 98669->98670 98671 8bd826 98670->98671 98672 85a961 22 API calls 98671->98672 98673 8bd82e 98672->98673 98674 85a961 22 API calls 98673->98674 98675 8bd836 98674->98675 98676 85525f 22 API calls 98675->98676 98677 8bd84d 98676->98677 98678 85525f 22 API calls 98677->98678 98679 8bd866 98678->98679 98680 854c6d 22 API calls 98679->98680 98681 8bd872 98680->98681 98682 8bd885 98681->98682 98684 8593b2 22 API calls 98681->98684 98683 854c6d 22 API calls 98682->98683 98685 8bd88e 98683->98685 98684->98682 98686 8bd89e 98685->98686 98687 8593b2 22 API calls 98685->98687 98688 8bd8b0 98686->98688 98689 85a8c7 22 API calls 98686->98689 98687->98686 98690 856350 22 API calls 98688->98690 98689->98688 98691 8bd8bb 98690->98691 98792 8bd978 22 API calls 98691->98792 98693 8bd8ca 98793 8bd978 22 API calls 98693->98793 98695 8bd8dd 98696 854c6d 22 API calls 98695->98696 98697 8bd8e7 98696->98697 98698 8bd8fe 98697->98698 98699 8bd8ec 98697->98699 98701 854c6d 22 API calls 98698->98701 98700 8533c6 22 API calls 98699->98700 98702 8bd8f9 98700->98702 98703 8bd907 98701->98703 98706 856350 22 API calls 98702->98706 98704 8bd925 98703->98704 98705 8533c6 22 API calls 98703->98705 98707 856350 22 API calls 98704->98707 98705->98702 98706->98704 98707->98658 98709 8c2954 __wsopen_s 98708->98709 98710 86fe0b 22 API calls 98709->98710 98711 8c2971 98710->98711 98712 855722 22 API calls 98711->98712 98713 8c297b 98712->98713 98714 8c274e 27 API calls 98713->98714 98715 8c2986 98714->98715 98716 85511f 64 API calls 98715->98716 98717 8c299b 98716->98717 98718 8c2a6c 98717->98718 98719 8c29bf 98717->98719 98720 8c2e66 75 API calls 98718->98720 98721 8c2e66 75 API calls 98719->98721 98722 8c2a38 98720->98722 98723 8c29c4 98721->98723 98725 8550f5 40 API calls 98722->98725 98728 8c2a75 ISource 98722->98728 98723->98728 98798 87d583 26 API calls 98723->98798 98726 8c2a91 98725->98726 98727 8550f5 40 API calls 98726->98727 98729 8c2aa1 98727->98729 98728->98442 98731 8550f5 40 API calls 98729->98731 98730 8c29ed 98799 87d583 26 API calls 98730->98799 98733 8c2abc 98731->98733 98734 8550f5 40 API calls 98733->98734 98735 8c2acc 98734->98735 98736 8550f5 40 API calls 98735->98736 98737 8c2ae7 98736->98737 98738 8550f5 40 API calls 98737->98738 98739 8c2af7 98738->98739 98740 8550f5 40 API calls 98739->98740 98741 8c2b07 98740->98741 98742 8550f5 40 API calls 98741->98742 98743 8c2b17 98742->98743 98794 8c3017 GetTempPathW GetTempFileNameW 98743->98794 98745 8c2b22 98746 87e5eb 29 API calls 98745->98746 98757 8c2b33 98746->98757 98747 8c2bed 98748 87e678 67 API calls 98747->98748 98749 8c2bf8 98748->98749 98751 8c2bfe DeleteFileW 98749->98751 98752 8c2c12 98749->98752 98750 8550f5 40 API calls 98750->98757 98751->98728 98753 8c2c91 CopyFileW 98752->98753 98759 8c2c18 98752->98759 98754 8c2cb9 DeleteFileW 98753->98754 98755 8c2ca7 DeleteFileW 98753->98755 98795 8c2fd8 CreateFileW 98754->98795 98755->98728 98757->98728 98757->98747 98757->98750 98758 87dbb3 65 API calls 98757->98758 98758->98757 98760 8c22ce 79 API calls 98759->98760 98761 8c2c7c 98760->98761 98761->98754 98762 8c2c80 DeleteFileW 98761->98762 98762->98728 98763->98368 98765 8930bb 98764->98765 98766 8533dd 98764->98766 98768 86fddb 22 API calls 98765->98768 98800 8533ee 98766->98800 98770 8930c5 _wcslen 98768->98770 98769 8533e8 98769->98397 98771 86fe0b 22 API calls 98770->98771 98772 8930fe __fread_nolock 98771->98772 98773->98402 98774->98415 98775->98639 98777 8563b6 __fread_nolock 98776->98777 98778 856382 98776->98778 98777->98650 98778->98777 98779 894a82 98778->98779 98780 8563a9 98778->98780 98782 86fddb 22 API calls 98779->98782 98787 85a587 98780->98787 98783 894a91 98782->98783 98784 86fe0b 22 API calls 98783->98784 98785 894ac5 __fread_nolock 98784->98785 98786->98651 98788 85a59d 98787->98788 98791 85a598 __fread_nolock 98787->98791 98789 89f80f 98788->98789 98790 86fe0b 22 API calls 98788->98790 98790->98791 98791->98777 98792->98693 98793->98695 98794->98745 98796 8c2fff SetFileTime CloseHandle 98795->98796 98797 8c3013 98795->98797 98796->98797 98797->98728 98798->98730 98799->98722 98801 8533fe _wcslen 98800->98801 98802 89311d 98801->98802 98803 853411 98801->98803 98805 86fddb 22 API calls 98802->98805 98804 85a587 22 API calls 98803->98804 98806 85341e __fread_nolock 98804->98806 98807 893127 98805->98807 98806->98769 98808 86fe0b 22 API calls 98807->98808 98809 893157 __fread_nolock 98808->98809 98811 8bdbdc GetFileAttributesW 98810->98811 98812 8bd4d5 98810->98812 98811->98812 98813 8bdbe8 FindFirstFileW 98811->98813 98812->98245 98813->98812 98814 8bdbf9 FindClose 98813->98814 98814->98812 98816 85ae01 98815->98816 98819 85ae1c ISource 98815->98819 98817 85aec9 22 API calls 98816->98817 98818 85ae09 CharUpperBuffW 98817->98818 98818->98819 98819->98256 98821 85acae 98820->98821 98822 85acd1 98821->98822 98844 8c359c 82 API calls __wsopen_s 98821->98844 98822->98308 98824->98308 98825->98305 98826->98309 98827->98309 98828->98260 98829->98297 98830->98274 98831->98297 98832->98297 98833->98308 98834->98308 98835->98308 98836->98308 98837->98308 98838->98308 98839->98287 98840->98297 98841->98294 98842->98304 98843->98297 98844->98822 98845->98334 98846->98334 98847->98331 98848->98331 98849->98317 98850->98331 98851 888402 98856 8881be 98851->98856 98854 88842a 98861 8881ef try_get_first_available_module 98856->98861 98858 8883ee 98875 8827ec 26 API calls ___std_exception_copy 98858->98875 98860 888343 98860->98854 98868 890984 98860->98868 98861->98861 98864 888338 98861->98864 98871 878e0b 40 API calls 2 library calls 98861->98871 98863 88838c 98863->98864 98872 878e0b 40 API calls 2 library calls 98863->98872 98864->98860 98874 87f2d9 20 API calls __dosmaperr 98864->98874 98866 8883ab 98866->98864 98873 878e0b 40 API calls 2 library calls 98866->98873 98876 890081 98868->98876 98870 89099f 98870->98854 98871->98863 98872->98866 98873->98864 98874->98858 98875->98860 98878 89008d __FrameHandler3::FrameUnwindToState 98876->98878 98877 89009b 98934 87f2d9 20 API calls __dosmaperr 98877->98934 98878->98877 98880 8900d4 98878->98880 98887 89065b 98880->98887 98881 8900a0 98935 8827ec 26 API calls ___std_exception_copy 98881->98935 98886 8900aa __wsopen_s 98886->98870 98937 89042f 98887->98937 98890 89068d 98969 87f2c6 20 API calls __dosmaperr 98890->98969 98891 8906a6 98955 885221 98891->98955 98894 8906ab 98895 8906cb 98894->98895 98896 8906b4 98894->98896 98968 89039a CreateFileW 98895->98968 98971 87f2c6 20 API calls __dosmaperr 98896->98971 98900 8906b9 98972 87f2d9 20 API calls __dosmaperr 98900->98972 98901 890704 98903 890781 GetFileType 98901->98903 98904 890756 GetLastError 98901->98904 98973 89039a CreateFileW 98901->98973 98905 89078c GetLastError 98903->98905 98907 8907d3 98903->98907 98974 87f2a3 20 API calls 2 library calls 98904->98974 98975 87f2a3 20 API calls 2 library calls 98905->98975 98977 88516a 21 API calls 3 library calls 98907->98977 98909 89079a CloseHandle 98911 890692 98909->98911 98912 8907c3 98909->98912 98970 87f2d9 20 API calls __dosmaperr 98911->98970 98976 87f2d9 20 API calls __dosmaperr 98912->98976 98914 890749 98914->98903 98914->98904 98916 8907f4 98918 890840 98916->98918 98978 8905ab 72 API calls 4 library calls 98916->98978 98917 8907c8 98917->98911 98922 89086d 98918->98922 98979 89014d 72 API calls 4 library calls 98918->98979 98921 890866 98921->98922 98923 89087e 98921->98923 98924 8886ae __wsopen_s 29 API calls 98922->98924 98925 8900f8 98923->98925 98926 8908fc CloseHandle 98923->98926 98924->98925 98936 890121 LeaveCriticalSection __wsopen_s 98925->98936 98980 89039a CreateFileW 98926->98980 98928 890927 98929 890931 GetLastError 98928->98929 98930 89095d 98928->98930 98981 87f2a3 20 API calls 2 library calls 98929->98981 98930->98925 98932 89093d 98982 885333 21 API calls 3 library calls 98932->98982 98934->98881 98935->98886 98936->98886 98938 890450 98937->98938 98944 89046a 98937->98944 98938->98944 98990 87f2d9 20 API calls __dosmaperr 98938->98990 98941 89045f 98991 8827ec 26 API calls ___std_exception_copy 98941->98991 98943 8904d1 98952 890524 98943->98952 98994 87d70d 26 API calls 2 library calls 98943->98994 98983 8903bf 98944->98983 98945 8904a2 98945->98943 98992 87f2d9 20 API calls __dosmaperr 98945->98992 98948 89051f 98950 89059e 98948->98950 98948->98952 98949 8904c6 98993 8827ec 26 API calls ___std_exception_copy 98949->98993 98995 8827fc 11 API calls _abort 98950->98995 98952->98890 98952->98891 98954 8905aa 98956 88522d __FrameHandler3::FrameUnwindToState 98955->98956 98998 882f5e EnterCriticalSection 98956->98998 98958 88527b 98999 88532a 98958->98999 98959 885259 99002 885000 21 API calls 3 library calls 98959->99002 98960 885234 98960->98958 98960->98959 98965 8852c7 EnterCriticalSection 98960->98965 98962 8852a4 __wsopen_s 98962->98894 98964 88525e 98964->98958 99003 885147 EnterCriticalSection 98964->99003 98965->98958 98966 8852d4 LeaveCriticalSection 98965->98966 98966->98960 98968->98901 98969->98911 98970->98925 98971->98900 98972->98911 98973->98914 98974->98911 98975->98909 98976->98917 98977->98916 98978->98918 98979->98921 98980->98928 98981->98932 98982->98930 98985 8903d7 98983->98985 98984 8903f2 98984->98945 98985->98984 98996 87f2d9 20 API calls __dosmaperr 98985->98996 98987 890416 98997 8827ec 26 API calls ___std_exception_copy 98987->98997 98989 890421 98989->98945 98990->98941 98991->98944 98992->98949 98993->98943 98994->98948 98995->98954 98996->98987 98997->98989 98998->98960 99004 882fa6 LeaveCriticalSection 98999->99004 99001 885331 99001->98962 99002->98964 99003->98958 99004->99001 99005 892ba5 99006 852b25 99005->99006 99007 892baf 99005->99007 99033 852b83 7 API calls 99006->99033 99048 853a5a 99007->99048 99011 892bb8 99013 859cb3 22 API calls 99011->99013 99015 892bc6 99013->99015 99014 852b2f 99020 852b44 99014->99020 99037 853837 99014->99037 99016 892bce 99015->99016 99017 892bf5 99015->99017 99021 8533c6 22 API calls 99016->99021 99018 8533c6 22 API calls 99017->99018 99022 892bf1 GetForegroundWindow ShellExecuteW 99018->99022 99025 852b5f 99020->99025 99047 8530f2 Shell_NotifyIconW ___scrt_fastfail 99020->99047 99023 892bd9 99021->99023 99027 892c26 99022->99027 99026 856350 22 API calls 99023->99026 99030 852b66 SetCurrentDirectoryW 99025->99030 99029 892be7 99026->99029 99027->99025 99031 8533c6 22 API calls 99029->99031 99032 852b7a 99030->99032 99031->99022 99055 852cd4 7 API calls 99033->99055 99035 852b2a 99036 852c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99035->99036 99036->99014 99038 853862 ___scrt_fastfail 99037->99038 99056 854212 99038->99056 99041 8538e8 99043 853906 Shell_NotifyIconW 99041->99043 99044 893386 Shell_NotifyIconW 99041->99044 99060 853923 99043->99060 99046 85391c 99046->99020 99047->99025 99049 891f50 __wsopen_s 99048->99049 99050 853a67 GetModuleFileNameW 99049->99050 99051 859cb3 22 API calls 99050->99051 99052 853a8d 99051->99052 99053 853aa2 23 API calls 99052->99053 99054 853a97 99053->99054 99054->99011 99055->99035 99057 8538b7 99056->99057 99058 8935a4 99056->99058 99057->99041 99082 8bc874 42 API calls _strftime 99057->99082 99058->99057 99059 8935ad DestroyIcon 99058->99059 99059->99057 99061 853a13 99060->99061 99062 85393f 99060->99062 99061->99046 99083 856270 99062->99083 99065 893393 LoadStringW 99068 8933ad 99065->99068 99066 85395a 99067 856b57 22 API calls 99066->99067 99069 85396f 99067->99069 99074 85a8c7 22 API calls 99068->99074 99076 853994 ___scrt_fastfail 99068->99076 99070 8933c9 99069->99070 99071 85397c 99069->99071 99073 856350 22 API calls 99070->99073 99071->99068 99072 853986 99071->99072 99075 856350 22 API calls 99072->99075 99077 8933d7 99073->99077 99074->99076 99075->99076 99079 8539f9 Shell_NotifyIconW 99076->99079 99077->99076 99078 8533c6 22 API calls 99077->99078 99080 8933f9 99078->99080 99079->99061 99081 8533c6 22 API calls 99080->99081 99081->99076 99082->99041 99084 86fe0b 22 API calls 99083->99084 99085 856295 99084->99085 99086 86fddb 22 API calls 99085->99086 99087 85394d 99086->99087 99087->99065 99087->99066 99088 1be23b0 99102 1be0000 99088->99102 99090 1be248a 99105 1be22a0 99090->99105 99092 1be24b3 CreateFileW 99094 1be2507 99092->99094 99095 1be2502 99092->99095 99094->99095 99096 1be251e VirtualAlloc 99094->99096 99096->99095 99097 1be253c ReadFile 99096->99097 99097->99095 99098 1be2557 99097->99098 99099 1be12a0 13 API calls 99098->99099 99100 1be258a 99099->99100 99101 1be25ad ExitProcess 99100->99101 99101->99095 99108 1be34b0 GetPEB 99102->99108 99104 1be068b 99104->99090 99106 1be22a9 Sleep 99105->99106 99107 1be22b7 99106->99107 99109 1be34da 99108->99109 99109->99104 99110 8890fa 99111 88911f 99110->99111 99112 889107 99110->99112 99116 88917a 99111->99116 99124 889117 99111->99124 99162 88fdc4 21 API calls 2 library calls 99111->99162 99160 87f2d9 20 API calls __dosmaperr 99112->99160 99114 88910c 99161 8827ec 26 API calls ___std_exception_copy 99114->99161 99117 87d955 __fread_nolock 26 API calls 99116->99117 99119 889192 99117->99119 99130 888c32 99119->99130 99121 889199 99122 87d955 __fread_nolock 26 API calls 99121->99122 99121->99124 99123 8891c5 99122->99123 99123->99124 99125 87d955 __fread_nolock 26 API calls 99123->99125 99126 8891d3 99125->99126 99126->99124 99127 87d955 __fread_nolock 26 API calls 99126->99127 99128 8891e3 99127->99128 99129 87d955 __fread_nolock 26 API calls 99128->99129 99129->99124 99131 888c3e __FrameHandler3::FrameUnwindToState 99130->99131 99132 888c5e 99131->99132 99133 888c46 99131->99133 99135 888d24 99132->99135 99138 888c97 99132->99138 99164 87f2c6 20 API calls __dosmaperr 99133->99164 99171 87f2c6 20 API calls __dosmaperr 99135->99171 99137 888c4b 99165 87f2d9 20 API calls __dosmaperr 99137->99165 99141 888cbb 99138->99141 99142 888ca6 99138->99142 99139 888d29 99172 87f2d9 20 API calls __dosmaperr 99139->99172 99163 885147 EnterCriticalSection 99141->99163 99166 87f2c6 20 API calls __dosmaperr 99142->99166 99146 888cb3 99173 8827ec 26 API calls ___std_exception_copy 99146->99173 99147 888cab 99167 87f2d9 20 API calls __dosmaperr 99147->99167 99148 888cc1 99150 888cdd 99148->99150 99151 888cf2 99148->99151 99168 87f2d9 20 API calls __dosmaperr 99150->99168 99155 888d45 __fread_nolock 38 API calls 99151->99155 99154 888c53 __wsopen_s 99154->99121 99156 888ced 99155->99156 99170 888d1c LeaveCriticalSection __wsopen_s 99156->99170 99157 888ce2 99169 87f2c6 20 API calls __dosmaperr 99157->99169 99160->99114 99161->99124 99162->99116 99163->99148 99164->99137 99165->99154 99166->99147 99167->99146 99168->99157 99169->99156 99170->99154 99171->99139 99172->99146 99173->99154 99174 852e37 99175 85a961 22 API calls 99174->99175 99176 852e4d 99175->99176 99253 854ae3 99176->99253 99178 852e6b 99179 853a5a 24 API calls 99178->99179 99180 852e7f 99179->99180 99181 859cb3 22 API calls 99180->99181 99182 852e8c 99181->99182 99183 854ecb 94 API calls 99182->99183 99184 852ea5 99183->99184 99185 852ead 99184->99185 99186 892cb0 99184->99186 99189 85a8c7 22 API calls 99185->99189 99187 8c2cf9 80 API calls 99186->99187 99188 892cc3 99187->99188 99190 892ccf 99188->99190 99192 854f39 68 API calls 99188->99192 99191 852ec3 99189->99191 99195 854f39 68 API calls 99190->99195 99267 856f88 22 API calls 99191->99267 99192->99190 99194 852ecf 99197 859cb3 22 API calls 99194->99197 99196 892ce5 99195->99196 99283 853084 22 API calls 99196->99283 99198 852edc 99197->99198 99268 85a81b 41 API calls 99198->99268 99201 852eec 99203 859cb3 22 API calls 99201->99203 99202 892d02 99284 853084 22 API calls 99202->99284 99205 852f12 99203->99205 99269 85a81b 41 API calls 99205->99269 99206 892d1e 99208 853a5a 24 API calls 99206->99208 99210 892d44 99208->99210 99209 852f21 99212 85a961 22 API calls 99209->99212 99285 853084 22 API calls 99210->99285 99214 852f3f 99212->99214 99213 892d50 99215 85a8c7 22 API calls 99213->99215 99270 853084 22 API calls 99214->99270 99216 892d5e 99215->99216 99286 853084 22 API calls 99216->99286 99219 852f4b 99271 874a28 40 API calls 3 library calls 99219->99271 99220 892d6d 99224 85a8c7 22 API calls 99220->99224 99222 852f59 99222->99196 99223 852f63 99222->99223 99272 874a28 40 API calls 3 library calls 99223->99272 99226 892d83 99224->99226 99287 853084 22 API calls 99226->99287 99227 852f6e 99227->99202 99229 852f78 99227->99229 99273 874a28 40 API calls 3 library calls 99229->99273 99230 892d90 99232 852f83 99232->99206 99233 852f8d 99232->99233 99274 874a28 40 API calls 3 library calls 99233->99274 99235 852f98 99236 852fdc 99235->99236 99275 853084 22 API calls 99235->99275 99236->99220 99237 852fe8 99236->99237 99237->99230 99277 8563eb 22 API calls 99237->99277 99239 852fbf 99241 85a8c7 22 API calls 99239->99241 99243 852fcd 99241->99243 99242 852ff8 99278 856a50 22 API calls 99242->99278 99276 853084 22 API calls 99243->99276 99245 853006 99279 8570b0 23 API calls 99245->99279 99250 853021 99251 853065 99250->99251 99280 856f88 22 API calls 99250->99280 99281 8570b0 23 API calls 99250->99281 99282 853084 22 API calls 99250->99282 99254 854af0 __wsopen_s 99253->99254 99255 856b57 22 API calls 99254->99255 99256 854b22 99254->99256 99255->99256 99257 854c6d 22 API calls 99256->99257 99265 854b58 99256->99265 99257->99256 99258 859cb3 22 API calls 99260 854c52 99258->99260 99259 859cb3 22 API calls 99259->99265 99261 85515f 22 API calls 99260->99261 99264 854c5e 99261->99264 99262 854c6d 22 API calls 99262->99265 99263 85515f 22 API calls 99263->99265 99264->99178 99265->99259 99265->99262 99265->99263 99266 854c29 99265->99266 99266->99258 99266->99264 99267->99194 99268->99201 99269->99209 99270->99219 99271->99222 99272->99227 99273->99232 99274->99235 99275->99239 99276->99236 99277->99242 99278->99245 99279->99250 99280->99250 99281->99250 99282->99250 99283->99202 99284->99206 99285->99213 99286->99220 99287->99230 99288 853156 99291 853170 99288->99291 99292 853187 99291->99292 99293 85318c 99292->99293 99294 8531eb 99292->99294 99331 8531e9 99292->99331 99298 853265 PostQuitMessage 99293->99298 99299 853199 99293->99299 99296 892dfb 99294->99296 99297 8531f1 99294->99297 99295 8531d0 DefWindowProcW 99333 85316a 99295->99333 99340 8518e2 10 API calls 99296->99340 99300 85321d SetTimer RegisterWindowMessageW 99297->99300 99301 8531f8 99297->99301 99298->99333 99303 8531a4 99299->99303 99304 892e7c 99299->99304 99309 853246 CreatePopupMenu 99300->99309 99300->99333 99306 853201 KillTimer 99301->99306 99307 892d9c 99301->99307 99310 892e68 99303->99310 99311 8531ae 99303->99311 99345 8bbf30 34 API calls ___scrt_fastfail 99304->99345 99336 8530f2 Shell_NotifyIconW ___scrt_fastfail 99306->99336 99313 892da1 99307->99313 99314 892dd7 MoveWindow 99307->99314 99308 892e1c 99341 86e499 42 API calls 99308->99341 99309->99333 99344 8bc161 27 API calls ___scrt_fastfail 99310->99344 99312 8531b9 99311->99312 99323 892e4d 99311->99323 99318 8531c4 99312->99318 99319 853253 99312->99319 99321 892da7 99313->99321 99322 892dc6 SetFocus 99313->99322 99314->99333 99318->99295 99342 8530f2 Shell_NotifyIconW ___scrt_fastfail 99318->99342 99338 85326f 44 API calls ___scrt_fastfail 99319->99338 99320 892e8e 99320->99295 99320->99333 99321->99318 99327 892db0 99321->99327 99322->99333 99323->99295 99343 8b0ad7 22 API calls 99323->99343 99324 853214 99337 853c50 DeleteObject DestroyWindow 99324->99337 99325 853263 99325->99333 99339 8518e2 10 API calls 99327->99339 99331->99295 99334 892e41 99335 853837 49 API calls 99334->99335 99335->99331 99336->99324 99337->99333 99338->99325 99339->99333 99340->99308 99341->99318 99342->99334 99343->99331 99344->99325 99345->99320 99346 85df10 99349 85b710 99346->99349 99348 85df1e 99350 85b72b 99349->99350 99351 8a00f8 99350->99351 99352 8a0146 99350->99352 99360 85b750 99350->99360 99355 8a0102 99351->99355 99358 8a010f 99351->99358 99351->99360 99392 8d58a2 235 API calls 2 library calls 99352->99392 99390 8d5d33 235 API calls 99355->99390 99377 85ba20 99358->99377 99391 8d61d0 235 API calls 2 library calls 99358->99391 99364 85bbe0 40 API calls 99360->99364 99365 86d336 40 API calls 99360->99365 99368 85ba4e 99360->99368 99369 8a0322 99360->99369 99373 85bbd0 99360->99373 99360->99377 99378 85ec40 235 API calls 99360->99378 99379 85a8c7 22 API calls 99360->99379 99381 85a81b 41 API calls 99360->99381 99382 86d2f0 40 API calls 99360->99382 99383 86a01b 235 API calls 99360->99383 99384 870242 5 API calls __Init_thread_wait 99360->99384 99385 86edcd 22 API calls 99360->99385 99386 8700a3 29 API calls __onexit 99360->99386 99387 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99360->99387 99388 86ee53 82 API calls 99360->99388 99389 86e5ca 235 API calls 99360->99389 99393 85aceb 23 API calls ISource 99360->99393 99394 8af6bf 23 API calls 99360->99394 99362 8a03d9 99362->99362 99364->99360 99365->99360 99368->99348 99395 8d5c0c 82 API calls 99369->99395 99373->99348 99377->99373 99396 8c359c 82 API calls __wsopen_s 99377->99396 99378->99360 99379->99360 99381->99360 99382->99360 99383->99360 99384->99360 99385->99360 99386->99360 99387->99360 99388->99360 99389->99360 99390->99358 99391->99377 99392->99360 99393->99360 99394->99360 99395->99377 99396->99362 99397 851033 99402 854c91 99397->99402 99401 851042 99403 85a961 22 API calls 99402->99403 99404 854cff 99403->99404 99410 853af0 99404->99410 99406 854d9c 99408 851038 99406->99408 99413 8551f7 22 API calls __fread_nolock 99406->99413 99409 8700a3 29 API calls __onexit 99408->99409 99409->99401 99414 853b1c 99410->99414 99413->99406 99415 853b0f 99414->99415 99416 853b29 99414->99416 99415->99406 99416->99415 99417 853b30 RegOpenKeyExW 99416->99417 99417->99415 99418 853b4a RegQueryValueExW 99417->99418 99419 853b80 RegCloseKey 99418->99419 99420 853b6b 99418->99420 99419->99415 99420->99419 99421 85f7bf 99422 85fcb6 99421->99422 99423 85f7d3 99421->99423 99458 85aceb 23 API calls ISource 99422->99458 99425 85fcc2 99423->99425 99427 86fddb 22 API calls 99423->99427 99459 85aceb 23 API calls ISource 99425->99459 99428 85f7e5 99427->99428 99428->99425 99429 85f83e 99428->99429 99430 85fd3d 99428->99430 99432 861310 235 API calls 99429->99432 99434 85ed9d ISource 99429->99434 99460 8c1155 22 API calls 99430->99460 99454 85ec76 ISource 99432->99454 99433 8a4beb 99464 8c359c 82 API calls __wsopen_s 99433->99464 99435 85fef7 99435->99434 99443 85a8c7 22 API calls 99435->99443 99437 86fddb 22 API calls 99437->99454 99439 8a4b0b 99462 8c359c 82 API calls __wsopen_s 99439->99462 99440 85a8c7 22 API calls 99440->99454 99443->99434 99444 8a4600 99444->99434 99446 85a8c7 22 API calls 99444->99446 99446->99434 99447 870242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 99447->99454 99448 85fbe3 99448->99434 99450 8a4bdc 99448->99450 99455 85f3ae ISource 99448->99455 99449 85a961 22 API calls 99449->99454 99463 8c359c 82 API calls __wsopen_s 99450->99463 99452 8700a3 29 API calls pre_c_initialization 99452->99454 99453 8701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 99453->99454 99454->99433 99454->99434 99454->99435 99454->99437 99454->99439 99454->99440 99454->99444 99454->99447 99454->99448 99454->99449 99454->99452 99454->99453 99454->99455 99456 8601e0 235 API calls 2 library calls 99454->99456 99457 8606a0 41 API calls ISource 99454->99457 99455->99434 99461 8c359c 82 API calls __wsopen_s 99455->99461 99456->99454 99457->99454 99458->99425 99459->99430 99460->99434 99461->99434 99462->99434 99463->99433 99464->99434 99465 8703fb 99466 870407 __FrameHandler3::FrameUnwindToState 99465->99466 99494 86feb1 99466->99494 99468 87040e 99469 870561 99468->99469 99472 870438 99468->99472 99521 87083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99469->99521 99471 870568 99522 874e52 28 API calls _abort 99471->99522 99483 870477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99472->99483 99505 88247d 99472->99505 99474 87056e 99523 874e04 28 API calls _abort 99474->99523 99478 870576 99479 870457 99481 8704d8 99513 870959 99481->99513 99483->99481 99517 874e1a 38 API calls 3 library calls 99483->99517 99485 8704de 99486 8704f3 99485->99486 99518 870992 GetModuleHandleW 99486->99518 99488 8704fa 99488->99471 99489 8704fe 99488->99489 99490 870507 99489->99490 99519 874df5 28 API calls _abort 99489->99519 99520 870040 13 API calls 2 library calls 99490->99520 99493 87050f 99493->99479 99495 86feba 99494->99495 99524 870698 IsProcessorFeaturePresent 99495->99524 99497 86fec6 99525 872c94 10 API calls 3 library calls 99497->99525 99499 86fecb 99500 86fecf 99499->99500 99526 882317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 99499->99526 99500->99468 99502 86fed8 99503 86fee6 99502->99503 99527 872cbd 8 API calls 3 library calls 99502->99527 99503->99468 99506 882494 99505->99506 99507 870a8c _ValidateLocalCookies 5 API calls 99506->99507 99508 870451 99507->99508 99508->99479 99509 882421 99508->99509 99510 882450 99509->99510 99511 870a8c _ValidateLocalCookies 5 API calls 99510->99511 99512 882479 99511->99512 99512->99483 99528 872340 99513->99528 99516 87097f 99516->99485 99517->99481 99518->99488 99519->99490 99520->99493 99521->99471 99522->99474 99523->99478 99524->99497 99525->99499 99526->99502 99527->99500 99529 87096c GetStartupInfoW 99528->99529 99529->99516 99530 851098 99535 8542de 99530->99535 99534 8510a7 99536 85a961 22 API calls 99535->99536 99537 8542f5 GetVersionExW 99536->99537 99538 856b57 22 API calls 99537->99538 99539 854342 99538->99539 99540 8593b2 22 API calls 99539->99540 99549 854378 99539->99549 99541 85436c 99540->99541 99543 8537a0 22 API calls 99541->99543 99542 85441b GetCurrentProcess IsWow64Process 99544 854437 99542->99544 99543->99549 99545 85444f LoadLibraryA 99544->99545 99546 893824 GetSystemInfo 99544->99546 99547 854460 GetProcAddress 99545->99547 99548 85449c GetSystemInfo 99545->99548 99547->99548 99551 854470 GetNativeSystemInfo 99547->99551 99552 854476 99548->99552 99549->99542 99550 8937df 99549->99550 99551->99552 99553 85109d 99552->99553 99554 85447a FreeLibrary 99552->99554 99555 8700a3 29 API calls __onexit 99553->99555 99554->99553 99555->99534 99556 85105b 99561 85344d 99556->99561 99558 85106a 99592 8700a3 29 API calls __onexit 99558->99592 99560 851074 99562 85345d __wsopen_s 99561->99562 99563 85a961 22 API calls 99562->99563 99564 853513 99563->99564 99565 853a5a 24 API calls 99564->99565 99566 85351c 99565->99566 99593 853357 99566->99593 99569 8533c6 22 API calls 99570 853535 99569->99570 99571 85515f 22 API calls 99570->99571 99572 853544 99571->99572 99573 85a961 22 API calls 99572->99573 99574 85354d 99573->99574 99575 85a6c3 22 API calls 99574->99575 99576 853556 RegOpenKeyExW 99575->99576 99577 893176 RegQueryValueExW 99576->99577 99581 853578 99576->99581 99578 89320c RegCloseKey 99577->99578 99579 893193 99577->99579 99578->99581 99591 89321e _wcslen 99578->99591 99580 86fe0b 22 API calls 99579->99580 99582 8931ac 99580->99582 99581->99558 99584 855722 22 API calls 99582->99584 99583 854c6d 22 API calls 99583->99591 99585 8931b7 RegQueryValueExW 99584->99585 99586 8931d4 99585->99586 99588 8931ee ISource 99585->99588 99587 856b57 22 API calls 99586->99587 99587->99588 99588->99578 99589 859cb3 22 API calls 99589->99591 99590 85515f 22 API calls 99590->99591 99591->99581 99591->99583 99591->99589 99591->99590 99592->99560 99594 891f50 __wsopen_s 99593->99594 99595 853364 GetFullPathNameW 99594->99595 99596 853386 99595->99596 99597 856b57 22 API calls 99596->99597 99598 8533a4 99597->99598 99598->99569 99599 8a3f75 99610 86ceb1 99599->99610 99601 8a3f8b 99602 8a4006 99601->99602 99619 86e300 23 API calls 99601->99619 99605 85bf40 235 API calls 99602->99605 99604 8a3fe6 99607 8a4052 99604->99607 99620 8c1abf 22 API calls 99604->99620 99605->99607 99608 8a4a88 99607->99608 99621 8c359c 82 API calls __wsopen_s 99607->99621 99611 86ced2 99610->99611 99612 86cebf 99610->99612 99614 86ced7 99611->99614 99615 86cf05 99611->99615 99622 85aceb 23 API calls ISource 99612->99622 99617 86fddb 22 API calls 99614->99617 99623 85aceb 23 API calls ISource 99615->99623 99618 86cec9 99617->99618 99618->99601 99619->99604 99620->99602 99621->99608 99622->99618 99623->99618

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 234 8542de-85434d call 85a961 GetVersionExW call 856b57 239 854353 234->239 240 893617-89362a 234->240 241 854355-854357 239->241 242 89362b-89362f 240->242 243 85435d-8543bc call 8593b2 call 8537a0 241->243 244 893656 241->244 245 893631 242->245 246 893632-89363e 242->246 263 8937df-8937e6 243->263 264 8543c2-8543c4 243->264 249 89365d-893660 244->249 245->246 246->242 248 893640-893642 246->248 248->241 251 893648-89364f 248->251 253 85441b-854435 GetCurrentProcess IsWow64Process 249->253 254 893666-8936a8 249->254 251->240 252 893651 251->252 252->244 256 854494-85449a 253->256 257 854437 253->257 254->253 258 8936ae-8936b1 254->258 260 85443d-854449 256->260 257->260 261 8936db-8936e5 258->261 262 8936b3-8936bd 258->262 265 85444f-85445e LoadLibraryA 260->265 266 893824-893828 GetSystemInfo 260->266 270 8936f8-893702 261->270 271 8936e7-8936f3 261->271 267 8936ca-8936d6 262->267 268 8936bf-8936c5 262->268 272 8937e8 263->272 273 893806-893809 263->273 264->249 269 8543ca-8543dd 264->269 276 854460-85446e GetProcAddress 265->276 277 85449c-8544a6 GetSystemInfo 265->277 267->253 268->253 278 8543e3-8543e5 269->278 279 893726-89372f 269->279 281 893715-893721 270->281 282 893704-893710 270->282 271->253 280 8937ee 272->280 274 89380b-89381a 273->274 275 8937f4-8937fc 273->275 274->280 285 89381c-893822 274->285 275->273 276->277 286 854470-854474 GetNativeSystemInfo 276->286 287 854476-854478 277->287 288 89374d-893762 278->288 289 8543eb-8543ee 278->289 283 89373c-893748 279->283 284 893731-893737 279->284 280->275 281->253 282->253 283->253 284->253 285->275 286->287 292 854481-854493 287->292 293 85447a-85447b FreeLibrary 287->293 290 89376f-89377b 288->290 291 893764-89376a 288->291 294 8543f4-85440f 289->294 295 893791-893794 289->295 290->253 291->253 293->292 297 854415 294->297 298 893780-89378c 294->298 295->253 296 89379a-8937c1 295->296 299 8937ce-8937da 296->299 300 8937c3-8937c9 296->300 297->253 298->253 299->253 300->253
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 0085430D
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            • GetCurrentProcess.KERNEL32(?,008ECB64,00000000,?,?), ref: 00854422
                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 00854429
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00854454
                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00854466
                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00854474
                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 0085447B
                            • GetSystemInfo.KERNEL32(?,?,?), ref: 008544A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                            • API String ID: 3290436268-3101561225
                            • Opcode ID: acc6d444da886e29d4bbfe284eaf146054c415f6099555fcad4ff374cde19a5e
                            • Instruction ID: b6d9b136c7d0ebf8fdc80891d20c188211884e1b330edbf6e0075021ae5bb6d4
                            • Opcode Fuzzy Hash: acc6d444da886e29d4bbfe284eaf146054c415f6099555fcad4ff374cde19a5e
                            • Instruction Fuzzy Hash: 71A1F86292E3C4DFCB32E7697C841D53FE6FB76345B0854A8E441D3A21D230466BEB25

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 661 8542a2-8542ba CreateStreamOnHGlobal 662 8542bc-8542d3 FindResourceExW 661->662 663 8542da-8542dd 661->663 664 8935ba-8935c9 LoadResource 662->664 665 8542d9 662->665 664->665 666 8935cf-8935dd SizeofResource 664->666 665->663 666->665 667 8935e3-8935ee LockResource 666->667 667->665 668 8935f4-893612 667->668 668->665
                            APIs
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,008550AA,?,?,00000000,00000000), ref: 008542B2
                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008550AA,?,?,00000000,00000000), ref: 008542C9
                            • LoadResource.KERNEL32(?,00000000,?,?,008550AA,?,?,00000000,00000000,?,?,?,?,?,?,00854F20), ref: 008935BE
                            • SizeofResource.KERNEL32(?,00000000,?,?,008550AA,?,?,00000000,00000000,?,?,?,?,?,?,00854F20), ref: 008935D3
                            • LockResource.KERNEL32(008550AA,?,?,008550AA,?,?,00000000,00000000,?,?,?,?,?,?,00854F20,?), ref: 008935E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                            • String ID: SCRIPT
                            • API String ID: 3051347437-3967369404
                            • Opcode ID: 9f81cbab77500ff95792ea28116be26f0896e4e70600caabdef4af4e10b9df17
                            • Instruction ID: 9c15060ed2aa809aa25d53d72e2d2ac91b2919176e46d743ff2ee47c0c657e5e
                            • Opcode Fuzzy Hash: 9f81cbab77500ff95792ea28116be26f0896e4e70600caabdef4af4e10b9df17
                            • Instruction Fuzzy Hash: E511CE70600301BFDB218B65DC88F277BB9FBC5B56F1441A9F913CA250DBB2DC068620

                            Control-flow Graph

                            APIs
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00852B6B
                              • Part of subcall function 00853A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00921418,?,00852E7F,?,?,?,00000000), ref: 00853A78
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00912224), ref: 00892C10
                            • ShellExecuteW.SHELL32(00000000,?,?,00912224), ref: 00892C17
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                            • String ID: runas
                            • API String ID: 448630720-4000483414
                            • Opcode ID: f893856325856e8b6f3d28c89de46c9631dc9d22cdfe88606d621e2c942d033a
                            • Instruction ID: 78887c82d3c60abe00f7dce8ed6b31a7aaf5d1c79281b0529945fb68fa754d5b
                            • Opcode Fuzzy Hash: f893856325856e8b6f3d28c89de46c9631dc9d22cdfe88606d621e2c942d033a
                            • Instruction Fuzzy Hash: 4E11D531608345AAC718FF68E8519AE7BA4FFA5352F44042CF886C21A2DF208A4E8713
                            APIs
                            • lstrlenW.KERNEL32(?,00895222), ref: 008BDBCE
                            • GetFileAttributesW.KERNELBASE(?), ref: 008BDBDD
                            • FindFirstFileW.KERNELBASE(?,?), ref: 008BDBEE
                            • FindClose.KERNEL32(00000000), ref: 008BDBFA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirstlstrlen
                            • String ID:
                            • API String ID: 2695905019-0
                            • Opcode ID: fe57b0d95bc8bb49705b739e949b91e2a658fab42d4dbb73f46236b97da1dd37
                            • Instruction ID: 2b5515c4af1f67548d9b5fc520a89f7e1e1cec80a2d9f488be09ea71328c2f43
                            • Opcode Fuzzy Hash: fe57b0d95bc8bb49705b739e949b91e2a658fab42d4dbb73f46236b97da1dd37
                            • Instruction Fuzzy Hash: 66F0A030C10A146782206B78AC4E8AA3B6CFF02334B104702F936C22F0FBB05D568695
                            APIs
                            • GetInputState.USER32 ref: 0085D807
                            • timeGetTime.WINMM ref: 0085DA07
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0085DB28
                            • TranslateMessage.USER32(?), ref: 0085DB7B
                            • DispatchMessageW.USER32(?), ref: 0085DB89
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0085DB9F
                            • Sleep.KERNEL32(0000000A), ref: 0085DBB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                            • String ID:
                            • API String ID: 2189390790-0
                            • Opcode ID: afb089a63c6c17bd580a7c6ba9c8e3306064393be0de4ca4819051e18dd76149
                            • Instruction ID: e44ec454b107d5bc6e0042e0333f2c3a2e5d7a36acac9ff4d14ceb9c630e43de
                            • Opcode Fuzzy Hash: afb089a63c6c17bd580a7c6ba9c8e3306064393be0de4ca4819051e18dd76149
                            • Instruction Fuzzy Hash: 6142CD30608345DFE739CF28C884BAABBE1FF46315F148559EC56CB2A1D770A849DB92

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00852D07
                            • RegisterClassExW.USER32(00000030), ref: 00852D31
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00852D42
                            • InitCommonControlsEx.COMCTL32(?), ref: 00852D5F
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00852D6F
                            • LoadIconW.USER32(000000A9), ref: 00852D85
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00852D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: 41cc9688ee415ccbb4dafeafc80c57c466cea72e05096a09ce94eaff3a08de37
                            • Instruction ID: 70331c882603278a7805e764956671e4a0ecd2ea5f3ddfefe323dbefdc54a77a
                            • Opcode Fuzzy Hash: 41cc9688ee415ccbb4dafeafc80c57c466cea72e05096a09ce94eaff3a08de37
                            • Instruction Fuzzy Hash: A221F7B5D15358AFDB10DFA8EC89BDDBBB4FB08700F00811AF611AA2A0D7B14556DF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 302 89065b-89068b call 89042f 305 89068d-890698 call 87f2c6 302->305 306 8906a6-8906b2 call 885221 302->306 311 89069a-8906a1 call 87f2d9 305->311 312 8906cb-890714 call 89039a 306->312 313 8906b4-8906c9 call 87f2c6 call 87f2d9 306->313 323 89097d-890983 311->323 321 890781-89078a GetFileType 312->321 322 890716-89071f 312->322 313->311 327 89078c-8907bd GetLastError call 87f2a3 CloseHandle 321->327 328 8907d3-8907d6 321->328 325 890721-890725 322->325 326 890756-89077c GetLastError call 87f2a3 322->326 325->326 332 890727-890754 call 89039a 325->332 326->311 327->311 339 8907c3-8907ce call 87f2d9 327->339 330 8907d8-8907dd 328->330 331 8907df-8907e5 328->331 335 8907e9-890837 call 88516a 330->335 331->335 336 8907e7 331->336 332->321 332->326 345 890839-890845 call 8905ab 335->345 346 890847-89086b call 89014d 335->346 336->335 339->311 345->346 353 89086f-890879 call 8886ae 345->353 351 89086d 346->351 352 89087e-8908c1 346->352 351->353 355 8908c3-8908c7 352->355 356 8908e2-8908f0 352->356 353->323 355->356 358 8908c9-8908dd 355->358 359 89097b 356->359 360 8908f6-8908fa 356->360 358->356 359->323 360->359 361 8908fc-89092f CloseHandle call 89039a 360->361 364 890931-89095d GetLastError call 87f2a3 call 885333 361->364 365 890963-890977 361->365 364->365 365->359
                            APIs
                              • Part of subcall function 0089039A: CreateFileW.KERNELBASE(00000000,00000000,?,00890704,?,?,00000000,?,00890704,00000000,0000000C), ref: 008903B7
                            • GetLastError.KERNEL32 ref: 0089076F
                            • __dosmaperr.LIBCMT ref: 00890776
                            • GetFileType.KERNELBASE(00000000), ref: 00890782
                            • GetLastError.KERNEL32 ref: 0089078C
                            • __dosmaperr.LIBCMT ref: 00890795
                            • CloseHandle.KERNEL32(00000000), ref: 008907B5
                            • CloseHandle.KERNEL32(?), ref: 008908FF
                            • GetLastError.KERNEL32 ref: 00890931
                            • __dosmaperr.LIBCMT ref: 00890938
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID: H
                            • API String ID: 4237864984-2852464175
                            • Opcode ID: 13f4c84d626d459131768b51ef78edae63a04bf2cdfc31235b97a46112b72c30
                            • Instruction ID: e7d95d53702f81519875fcdc9cf57040269fe8e7d746a68cd7152a41aafa4abe
                            • Opcode Fuzzy Hash: 13f4c84d626d459131768b51ef78edae63a04bf2cdfc31235b97a46112b72c30
                            • Instruction Fuzzy Hash: 0DA10532A141089FDF19AF68D851BAE7BA0FB46324F184159F815DF392DB319813DF92

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00853A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00921418,?,00852E7F,?,?,?,00000000), ref: 00853A78
                              • Part of subcall function 00853357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00853379
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0085356A
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0089318D
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 008931CE
                            • RegCloseKey.ADVAPI32(?), ref: 00893210
                            • _wcslen.LIBCMT ref: 00893277
                            • _wcslen.LIBCMT ref: 00893286
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                            • API String ID: 98802146-2727554177
                            • Opcode ID: ae9920372f84dbd780425eb49403bf0b7673dbd3fc8cfea39b0c208f536bb62b
                            • Instruction ID: 592d0630a27dd73bfac487399e0e6ba0aef74c826471be43cdc99d007042823e
                            • Opcode Fuzzy Hash: ae9920372f84dbd780425eb49403bf0b7673dbd3fc8cfea39b0c208f536bb62b
                            • Instruction Fuzzy Hash: 8B71B371418301AFC724EF69EC8196BBBE8FF95B51F80042EF945C7161EB349A4ACB52

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00852B8E
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00852B9D
                            • LoadIconW.USER32(00000063), ref: 00852BB3
                            • LoadIconW.USER32(000000A4), ref: 00852BC5
                            • LoadIconW.USER32(000000A2), ref: 00852BD7
                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00852BEF
                            • RegisterClassExW.USER32(?), ref: 00852C40
                              • Part of subcall function 00852CD4: GetSysColorBrush.USER32(0000000F), ref: 00852D07
                              • Part of subcall function 00852CD4: RegisterClassExW.USER32(00000030), ref: 00852D31
                              • Part of subcall function 00852CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00852D42
                              • Part of subcall function 00852CD4: InitCommonControlsEx.COMCTL32(?), ref: 00852D5F
                              • Part of subcall function 00852CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00852D6F
                              • Part of subcall function 00852CD4: LoadIconW.USER32(000000A9), ref: 00852D85
                              • Part of subcall function 00852CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00852D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: b68b35a38edfde2dfa44e9778bad5e532f9f7d83f1f28e8af3dac8b17ae57b1d
                            • Instruction ID: f1a050d9eb0dc933d60f3cbecda8ed7181659fb2315f4b22954b96c95747eefe
                            • Opcode Fuzzy Hash: b68b35a38edfde2dfa44e9778bad5e532f9f7d83f1f28e8af3dac8b17ae57b1d
                            • Instruction Fuzzy Hash: 84214F70E24354ABDB20DFA9EC85B9D7FB6FB1CB50F00402AF500A66A0D7B10556EF90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 443 853170-853185 444 8531e5-8531e7 443->444 445 853187-85318a 443->445 444->445 446 8531e9 444->446 447 85318c-853193 445->447 448 8531eb 445->448 449 8531d0-8531d8 DefWindowProcW 446->449 452 853265-85326d PostQuitMessage 447->452 453 853199-85319e 447->453 450 892dfb-892e23 call 8518e2 call 86e499 448->450 451 8531f1-8531f6 448->451 454 8531de-8531e4 449->454 486 892e28-892e2f 450->486 456 85321d-853244 SetTimer RegisterWindowMessageW 451->456 457 8531f8-8531fb 451->457 455 853219-85321b 452->455 459 8531a4-8531a8 453->459 460 892e7c-892e90 call 8bbf30 453->460 455->454 456->455 465 853246-853251 CreatePopupMenu 456->465 462 853201-853214 KillTimer call 8530f2 call 853c50 457->462 463 892d9c-892d9f 457->463 466 892e68-892e77 call 8bc161 459->466 467 8531ae-8531b3 459->467 460->455 479 892e96 460->479 462->455 471 892da1-892da5 463->471 472 892dd7-892df6 MoveWindow 463->472 465->455 466->455 468 892e4d-892e54 467->468 469 8531b9-8531be 467->469 468->449 482 892e5a-892e63 call 8b0ad7 468->482 477 8531c4-8531ca 469->477 478 853253-853263 call 85326f 469->478 480 892da7-892daa 471->480 481 892dc6-892dd2 SetFocus 471->481 472->455 477->449 477->486 478->455 479->449 480->477 487 892db0-892dc1 call 8518e2 480->487 481->455 482->449 486->449 491 892e35-892e48 call 8530f2 call 853837 486->491 487->455 491->449
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0085316A,?,?), ref: 008531D8
                            • KillTimer.USER32(?,00000001,?,?,?,?,?,0085316A,?,?), ref: 00853204
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00853227
                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0085316A,?,?), ref: 00853232
                            • CreatePopupMenu.USER32 ref: 00853246
                            • PostQuitMessage.USER32(00000000), ref: 00853267
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated
                            • API String ID: 129472671-2362178303
                            • Opcode ID: d34c8fe65c5371793c9a1db8fbaf56b928dbc97cde8d06d3eb8401b49ce005d4
                            • Instruction ID: a055ba70ea2b8c2354705af2c8ea446051f4ea72d13f6460de0e1e3d0fb9af65
                            • Opcode Fuzzy Hash: d34c8fe65c5371793c9a1db8fbaf56b928dbc97cde8d06d3eb8401b49ce005d4
                            • Instruction Fuzzy Hash: 6A419A34654608BBDF356B3CAC4DB793A59F7153C7F040125FD02C62A1CB708E5AA7A2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 499 888d45-888d55 500 888d6f-888d71 499->500 501 888d57-888d6a call 87f2c6 call 87f2d9 499->501 503 8890d9-8890e6 call 87f2c6 call 87f2d9 500->503 504 888d77-888d7d 500->504 515 8890f1 501->515 522 8890ec call 8827ec 503->522 504->503 507 888d83-888dae 504->507 507->503 510 888db4-888dbd 507->510 513 888dbf-888dd2 call 87f2c6 call 87f2d9 510->513 514 888dd7-888dd9 510->514 513->522 518 888ddf-888de3 514->518 519 8890d5-8890d7 514->519 521 8890f4-8890f9 515->521 518->519 520 888de9-888ded 518->520 519->521 520->513 524 888def-888e06 520->524 522->515 527 888e08-888e0b 524->527 528 888e23-888e2c 524->528 530 888e0d-888e13 527->530 531 888e15-888e1e 527->531 532 888e4a-888e54 528->532 533 888e2e-888e45 call 87f2c6 call 87f2d9 call 8827ec 528->533 530->531 530->533 534 888ebf-888ed9 531->534 536 888e5b-888e79 call 883820 call 8829c8 * 2 532->536 537 888e56-888e58 532->537 564 88900c 533->564 540 888fad-888fb6 call 88f89b 534->540 541 888edf-888eef 534->541 568 888e7b-888e91 call 87f2d9 call 87f2c6 536->568 569 888e96-888ebc call 889424 536->569 537->536 553 888fb8-888fca 540->553 554 889029 540->554 541->540 542 888ef5-888ef7 541->542 542->540 546 888efd-888f23 542->546 546->540 550 888f29-888f3c 546->550 550->540 555 888f3e-888f40 550->555 553->554 559 888fcc-888fdb GetConsoleMode 553->559 557 88902d-889045 ReadFile 554->557 555->540 560 888f42-888f6d 555->560 562 8890a1-8890ac GetLastError 557->562 563 889047-88904d 557->563 559->554 565 888fdd-888fe1 559->565 560->540 567 888f6f-888f82 560->567 570 8890ae-8890c0 call 87f2d9 call 87f2c6 562->570 571 8890c5-8890c8 562->571 563->562 572 88904f 563->572 566 88900f-889019 call 8829c8 564->566 565->557 573 888fe3-888ffd ReadConsoleW 565->573 566->521 567->540 577 888f84-888f86 567->577 568->564 569->534 570->564 574 8890ce-8890d0 571->574 575 889005-88900b call 87f2a3 571->575 581 889052-889064 572->581 582 88901e-889027 573->582 583 888fff GetLastError 573->583 574->566 575->564 577->540 586 888f88-888fa8 577->586 581->566 590 889066-88906a 581->590 582->581 583->575 586->540 594 88906c-88907c call 888a61 590->594 595 889083-88908e 590->595 604 88907f-889081 594->604 596 88909a-88909f call 8888a1 595->596 597 889090 call 888bb1 595->597 605 889095-889098 596->605 597->605 604->566 605->604
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b69aa5d59d53e68da848490990df77c12e45d88b687c6636e29ca6389491c0f4
                            • Instruction ID: f5d7b611e363d91aa6205e5c5d7fd7aab0db180afeadcf54163f5018ca9490e5
                            • Opcode Fuzzy Hash: b69aa5d59d53e68da848490990df77c12e45d88b687c6636e29ca6389491c0f4
                            • Instruction Fuzzy Hash: 79C1BF74A04249EFDB21AFA9D841BADBBB4FF49310F184199E954E7393CB309941CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 607 1be2600-1be26ae call 1be0000 610 1be26b5-1be26db call 1be3510 CreateFileW 607->610 613 1be26dd 610->613 614 1be26e2-1be26f2 610->614 615 1be282d-1be2831 613->615 621 1be26f9-1be2713 VirtualAlloc 614->621 622 1be26f4 614->622 616 1be2873-1be2876 615->616 617 1be2833-1be2837 615->617 623 1be2879-1be2880 616->623 619 1be2839-1be283c 617->619 620 1be2843-1be2847 617->620 619->620 624 1be2849-1be2853 620->624 625 1be2857-1be285b 620->625 626 1be271a-1be2731 ReadFile 621->626 627 1be2715 621->627 622->615 628 1be28d5-1be28ea 623->628 629 1be2882-1be288d 623->629 624->625 634 1be285d-1be2867 625->634 635 1be286b 625->635 636 1be2738-1be2778 VirtualAlloc 626->636 637 1be2733 626->637 627->615 632 1be28ec-1be28f7 VirtualFree 628->632 633 1be28fa-1be2902 628->633 630 1be288f 629->630 631 1be2891-1be289d 629->631 630->628 638 1be289f-1be28af 631->638 639 1be28b1-1be28bd 631->639 632->633 634->635 635->616 640 1be277f-1be279a call 1be3760 636->640 641 1be277a 636->641 637->615 643 1be28d3 638->643 644 1be28bf-1be28c8 639->644 645 1be28ca-1be28d0 639->645 647 1be27a5-1be27af 640->647 641->615 643->623 644->643 645->643 648 1be27e2-1be27f6 call 1be3570 647->648 649 1be27b1-1be27e0 call 1be3760 647->649 655 1be27fa-1be27fe 648->655 656 1be27f8 648->656 649->647 657 1be280a-1be280e 655->657 658 1be2800-1be2804 FindCloseChangeNotification 655->658 656->615 659 1be281e-1be2827 657->659 660 1be2810-1be281b VirtualFree 657->660 658->657 659->610 659->615 660->659
                            APIs
                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01BE26D1
                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01BE28F7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2200794064.0000000001BE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1be0000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateFileFreeVirtual
                            • String ID:
                            • API String ID: 204039940-0
                            • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                            • Instruction ID: a08856a27eac776749773de34e8a88db43d2ccac7f8ab13d1ca2c9502a0c2625
                            • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                            • Instruction Fuzzy Hash: FDA1FA74E00209EBDB18CFA4C958BEEBBB9FF48304F208599E501BB281D7759A41CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 671 852c63-852cd3 CreateWindowExW * 2 ShowWindow * 2
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00852C91
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00852CB2
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00851CAD,?), ref: 00852CC6
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00851CAD,?), ref: 00852CCF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: 18585488122220cee87f9920cb32da45846771caf557e91fe22d9c7059f947cb
                            • Instruction ID: 02d8337cf3f98966230cc0343bfe6fb83b3dcb304eb4ab63a039227ae7eaff13
                            • Opcode Fuzzy Hash: 18585488122220cee87f9920cb32da45846771caf557e91fe22d9c7059f947cb
                            • Instruction Fuzzy Hash: 1FF03A759543D47AEB305717AC48E772EBEE7DBF50B01002AF900A61A0C2750862EAB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 786 1be23b0-1be2500 call 1be0000 call 1be22a0 CreateFileW 793 1be2507-1be2517 786->793 794 1be2502 786->794 797 1be251e-1be2538 VirtualAlloc 793->797 798 1be2519 793->798 795 1be25b7-1be25bc 794->795 799 1be253c-1be2553 ReadFile 797->799 800 1be253a 797->800 798->795 801 1be2557-1be2591 call 1be22e0 call 1be12a0 799->801 802 1be2555 799->802 800->795 807 1be25ad-1be25b5 ExitProcess 801->807 808 1be2593-1be25a8 call 1be2330 801->808 802->795 807->795 808->807
                            APIs
                              • Part of subcall function 01BE22A0: Sleep.KERNELBASE(000001F4), ref: 01BE22B1
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01BE24F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2200794064.0000000001BE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1be0000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateFileSleep
                            • String ID: KSM1DU9TCRWNFOS1V1NS51U
                            • API String ID: 2694422964-2769987326
                            • Opcode ID: 3d2a7c50e845602b69e563ea1e858f40d37a0e72d48e6a757646aeffd6a4b808
                            • Instruction ID: a6924c4f0dbf6a3b38cab1cd612bbf823083b0749af7668b30cc1b915bd4663b
                            • Opcode Fuzzy Hash: 3d2a7c50e845602b69e563ea1e858f40d37a0e72d48e6a757646aeffd6a4b808
                            • Instruction Fuzzy Hash: 9961A370D04288DBEF15DBA4C858BEEBBB8AF19304F0041D9E649BB2C1D7B91B45CB65

                            Control-flow Graph

                            APIs
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C2C05
                            • DeleteFileW.KERNEL32(?), ref: 008C2C87
                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008C2C9D
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C2CAE
                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008C2CC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: File$Delete$Copy
                            • String ID:
                            • API String ID: 3226157194-0
                            • Opcode ID: 43bab5a235f0b6c4bfe7c9ca0cfebc0ed5714d76ef87e2e8e307b53c9fa07c83
                            • Instruction ID: 3d2937c3a82f80c7fa9c55105d1e11c97c0e110d52f5c7cd74bb81bf592039cb
                            • Opcode Fuzzy Hash: 43bab5a235f0b6c4bfe7c9ca0cfebc0ed5714d76ef87e2e8e307b53c9fa07c83
                            • Instruction Fuzzy Hash: 11B12D72D0011DABDF11DBA8CC85EDEBB7DFF49354F1040AAFA09E6195EA30DA448B61

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00851BF4
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00851BFC
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00851C07
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00851C12
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00851C1A
                              • Part of subcall function 00851BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00851C22
                              • Part of subcall function 00851B4A: RegisterWindowMessageW.USER32(00000004,?,008512C4), ref: 00851BA2
                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0085136A
                            • OleInitialize.OLE32 ref: 00851388
                            • CloseHandle.KERNEL32(00000000,00000000), ref: 008924AB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                            • String ID: 0m
                            • API String ID: 1986988660-3665595038
                            • Opcode ID: 4d79e4c74cde1aba4bf3e95726a3874e2d55048bd4ed6e54176a71524aa50ee3
                            • Instruction ID: abeeb323f6d0155a18d17686a55fb62ab4618503f3f1d7b86148422aac4b3ab8
                            • Opcode Fuzzy Hash: 4d79e4c74cde1aba4bf3e95726a3874e2d55048bd4ed6e54176a71524aa50ee3
                            • Instruction Fuzzy Hash: 6E71EEB4D293448FC7A4EF7DA885A543AE4FBA934035482BAE51AC7371EB304427EF41
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00853B0F,SwapMouseButtons,00000004,?), ref: 00853B40
                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00853B0F,SwapMouseButtons,00000004,?), ref: 00853B61
                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00853B0F,SwapMouseButtons,00000004,?), ref: 00853B83
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 3677997916-824357125
                            • Opcode ID: 63ce7d71e8886ce38a11b0c00a44c628d2acf2f32b07a45e8c9a66993406c45e
                            • Instruction ID: d2080c4487a8a472ca10c79ee9f15cfb9ea8ef32d590ae41a5400f9496ed500d
                            • Opcode Fuzzy Hash: 63ce7d71e8886ce38a11b0c00a44c628d2acf2f32b07a45e8c9a66993406c45e
                            • Instruction Fuzzy Hash: 0F112AB5510218FFDB20CFA5DC84AAEB7B9FF04795B104459F805D7110D2319F499761
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01BE1ACD
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01BE1AF1
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01BE1B13
                            Memory Dump Source
                            • Source File: 00000000.00000002.2200794064.0000000001BE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1be0000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                            • Instruction ID: b4c882f19c0121017c9bf938bf4afa0eb17e5f16cdd87a693cd54afe42d7eb7d
                            • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                            • Instruction Fuzzy Hash: 1C621D30A14258DBEB24DFA4C854BDEB376EF58300F1091A9D20DEB390E7769E81CB59
                            Strings
                            • Variable must be of type 'Object'., xrefs: 008A32B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable must be of type 'Object'.
                            • API String ID: 0-109567571
                            • Opcode ID: 8e828af1feea641e4d0b42d9fbcdee4e62fc1fb9cb19d77785dbd6fd340dce62
                            • Instruction ID: f37229015da9b23a330402d1ab80b41137ce64fa1f19239154faed8d7654f736
                            • Opcode Fuzzy Hash: 8e828af1feea641e4d0b42d9fbcdee4e62fc1fb9cb19d77785dbd6fd340dce62
                            • Instruction Fuzzy Hash: F1C28871A00218CFDB28CF58C880AADB7B1FF19315F248169E956EB391D375EE49CB91
                            APIs
                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 008933A2
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00853A04
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_wcslen
                            • String ID: Line:
                            • API String ID: 2289894680-1585850449
                            • Opcode ID: 23a424311eded4dec13ac8bf9159f4457cf47d3944a705691293ddc71bea6fb4
                            • Instruction ID: 45a1a265111aad6eb0696b2a825a45f7505991a3d574f46a86e8f59176c1e9d2
                            • Opcode Fuzzy Hash: 23a424311eded4dec13ac8bf9159f4457cf47d3944a705691293ddc71bea6fb4
                            • Instruction Fuzzy Hash: 4F31E0B1408304AAC725EB24DC45BEBBBD8FB50355F00492AF999C3191EB709A5DC7C3
                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00870668
                              • Part of subcall function 008732A4: RaiseException.KERNEL32(?,?,?,0087068A,?,00921444,?,?,?,?,?,?,0087068A,00851129,00918738,00851129), ref: 00873304
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00870685
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Exception@8Throw$ExceptionRaise
                            • String ID: Unknown exception
                            • API String ID: 3476068407-410509341
                            • Opcode ID: df60e9aa84ad16b1cf3a113adcfcdb7cb8ac55f2c866d6b14b670de34ff5fc8e
                            • Instruction ID: 39ed7a02283fcb96772fb160510f62f3ed40305c7fc70e64d8de78ad9a514b5b
                            • Opcode Fuzzy Hash: df60e9aa84ad16b1cf3a113adcfcdb7cb8ac55f2c866d6b14b670de34ff5fc8e
                            • Instruction Fuzzy Hash: 92F0A424A0030DA78B00B6A8E856C9E776CFE50354B608131B92CD559AEF71EA659D82
                            APIs
                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 008C302F
                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 008C3044
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Temp$FileNamePath
                            • String ID: aut
                            • API String ID: 3285503233-3010740371
                            • Opcode ID: b3d5e4294bfbb1fc3edf759f8a262df7cbac42925fcd17c932f3ea2ef5ebeeb0
                            • Instruction ID: b38c620184b0240d84c07479449c2def330ea8ec19f54cf32dd8e20db7b3732f
                            • Opcode Fuzzy Hash: b3d5e4294bfbb1fc3edf759f8a262df7cbac42925fcd17c932f3ea2ef5ebeeb0
                            • Instruction Fuzzy Hash: 03D05E72D0032867DA20A7A4AC4EFCB3A6CEB04751F4002A1BB55E6091DAB09985CAD0
                            APIs
                            • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 008D82F5
                            • TerminateProcess.KERNEL32(00000000), ref: 008D82FC
                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 008D84DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$CurrentFreeLibraryTerminate
                            • String ID:
                            • API String ID: 146820519-0
                            • Opcode ID: 8708d442075fb41bbda5f2be32b872c16a8f8dbda3bc75a33bd14d1d0e36b0ab
                            • Instruction ID: 8b23faf97b8eda97dbbe4a7886343cff7283a7868abb162ccbe71b4dbe43a6cf
                            • Opcode Fuzzy Hash: 8708d442075fb41bbda5f2be32b872c16a8f8dbda3bc75a33bd14d1d0e36b0ab
                            • Instruction Fuzzy Hash: 43123971A08341DFC714DF28C484A6ABBE5FF85318F148A5EE899CB352DB31E945CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fa0e3f03a425eda1a09a0bb2e1c05cfeaabbec4af30bd76232baf23334fca652
                            • Instruction ID: 1d09538e6e61b1533d75b371c2c5ea7e2e57e9d505d521f614e868eaa0fed096
                            • Opcode Fuzzy Hash: fa0e3f03a425eda1a09a0bb2e1c05cfeaabbec4af30bd76232baf23334fca652
                            • Instruction Fuzzy Hash: 2D51CC71D10609ABCB21BFA9C945AEEBBB9FF15324F14001AE405E7292D7309A01DB62
                            APIs
                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,008885CC,?,00918CC8,0000000C), ref: 00888704
                            • GetLastError.KERNEL32(?,008885CC,?,00918CC8,0000000C), ref: 0088870E
                            • __dosmaperr.LIBCMT ref: 00888739
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                            • String ID:
                            • API String ID: 490808831-0
                            • Opcode ID: a6f6b420660046291b0d9144ace67d92cd5e7abdbdb2b7cc104c447ee11416b9
                            • Instruction ID: 6c655b760bd768666a3a6df2e5cb6c40bd61a137715077ff694b5d8d5d1b6275
                            • Opcode Fuzzy Hash: a6f6b420660046291b0d9144ace67d92cd5e7abdbdb2b7cc104c447ee11416b9
                            • Instruction Fuzzy Hash: C7016B32A0426096C630B238684977E6B59FF92778F78011DF814CB2D3EEA0DC818351
                            APIs
                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,008C2CD4,?,?,?,00000004,00000001), ref: 008C2FF2
                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,008C2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008C3006
                            • CloseHandle.KERNEL32(00000000,?,008C2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008C300D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleTime
                            • String ID:
                            • API String ID: 3397143404-0
                            • Opcode ID: 8fbcfe7ed7f1b4665a268cd211bc0d98f1b40697bfccd56eb5aabc626f0cde07
                            • Instruction ID: 023f82dc777caa2102df8eb7c5a4acbc587f053f72454f8662f1ec6384547418
                            • Opcode Fuzzy Hash: 8fbcfe7ed7f1b4665a268cd211bc0d98f1b40697bfccd56eb5aabc626f0cde07
                            • Instruction Fuzzy Hash: 4DE0863268025077D2311755BC4DF8B3E1CEB86B71F104214FB29B91D046A0550242A8
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 008617F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Init_thread_footer
                            • String ID: CALL
                            • API String ID: 1385522511-4196123274
                            • Opcode ID: 819497c4549f2451085c3a8c8f33fe78b5f4c21568234f66067d8c964f5ae12a
                            • Instruction ID: d8300b722b8c5a82fde88f4f5824b2d036de67d34c68fcebfea986525934fd66
                            • Opcode Fuzzy Hash: 819497c4549f2451085c3a8c8f33fe78b5f4c21568234f66067d8c964f5ae12a
                            • Instruction Fuzzy Hash: 7F227A706082019FDB14DF18C488A2ABBF2FF85314F19892DF596CB762D771E855CB92
                            APIs
                            • _wcslen.LIBCMT ref: 008C6F6B
                              • Part of subcall function 00854ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854EFD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LibraryLoad_wcslen
                            • String ID: >>>AUTOIT SCRIPT<<<
                            • API String ID: 3312870042-2806939583
                            • Opcode ID: 3e082f2729d7127b37d3f9cc95bae27ca8c15a56fd376bf11b496042d64eaa5c
                            • Instruction ID: 66392d1a08c48c9058aba51dc9eddb93c0143d96b1f21486a549609ebce5bfca
                            • Opcode Fuzzy Hash: 3e082f2729d7127b37d3f9cc95bae27ca8c15a56fd376bf11b496042d64eaa5c
                            • Instruction Fuzzy Hash: 4FB14D311086019FCB14EF28C491DAAB7E5FF94315F44896DF896D7262EB30ED49CB92
                            APIs
                            • GetOpenFileNameW.COMDLG32(?), ref: 00892C8C
                              • Part of subcall function 00853AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853A97,?,?,00852E7F,?,?,?,00000000), ref: 00853AC2
                              • Part of subcall function 00852DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00852DC4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Name$Path$FileFullLongOpen
                            • String ID: X
                            • API String ID: 779396738-3081909835
                            • Opcode ID: 3711821723c891998a644ee13a92444aa71bdae12c5b4029033d37db954721f0
                            • Instruction ID: 68b6ddda2dfe916eb169d9834f990d830271b5ac9ce1b44b38c146b878ee4b7d
                            • Opcode Fuzzy Hash: 3711821723c891998a644ee13a92444aa71bdae12c5b4029033d37db954721f0
                            • Instruction Fuzzy Hash: 93216271A0025C9ADB11AB98C8457EE7BF9FF49315F004059E805E7241DBB4558D8B62
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __fread_nolock
                            • String ID: EA06
                            • API String ID: 2638373210-3962188686
                            • Opcode ID: 761ce3d1cb2d8fe165e29a8eeaa8fd179b679c3923e9d21f498fcdc2644f74e4
                            • Instruction ID: 7a36ba100591b9a3580f3a794e00fbe8403a6001eb871f615a428a9480ad0390
                            • Opcode Fuzzy Hash: 761ce3d1cb2d8fe165e29a8eeaa8fd179b679c3923e9d21f498fcdc2644f74e4
                            • Instruction Fuzzy Hash: A601B5729442587EDF58C7A8C856FEEBBF8EB05305F00859EE156D21C1E5B4E6088B61
                            APIs
                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00853908
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: IconNotifyShell_
                            • String ID:
                            • API String ID: 1144537725-0
                            • Opcode ID: a7c0913baed1770d1c3741e099c7cf2b42c6fbed10804a97f874aa14b21bd245
                            • Instruction ID: b232c562efe947c2ae6712b78b9d9affc6cc28bab0f608f823058061b582a190
                            • Opcode Fuzzy Hash: a7c0913baed1770d1c3741e099c7cf2b42c6fbed10804a97f874aa14b21bd245
                            • Instruction Fuzzy Hash: 473191B09043019FD721DF24D884797BBE8FB49749F00092EF99AC7350E771AA58DB52
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 0085BB4E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Init_thread_footer
                            • String ID:
                            • API String ID: 1385522511-0
                            • Opcode ID: 2de453db963224dbdd249c6fa7ee2cc5885a545bad25d8c2d3cd201a21f10397
                            • Instruction ID: 33f2cb907f27c91dac4bb8be807744413c1fb256459f3f108d2f1e013a012c06
                            • Opcode Fuzzy Hash: 2de453db963224dbdd249c6fa7ee2cc5885a545bad25d8c2d3cd201a21f10397
                            • Instruction Fuzzy Hash: 2532CA30A00209AFEB20CF58C894BBABBB9FF55315F148069ED05EB351D774AD49CB92
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01BE1ACD
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01BE1AF1
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01BE1B13
                            Memory Dump Source
                            • Source File: 00000000.00000002.2200794064.0000000001BE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1be0000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                            • Instruction ID: 3bb2e1bf0e592a33df961d931138d7e8f4d3d5b4f9d883edfafbef8dd510608d
                            • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                            • Instruction Fuzzy Hash: D712EE24E14658C6EB24DF64D8547DEB272FF68300F10A0E9910DEB7A4E77A4F81CB5A
                            APIs
                              • Part of subcall function 00854E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00854EDD,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E9C
                              • Part of subcall function 00854E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00854EAE
                              • Part of subcall function 00854E90: FreeLibrary.KERNEL32(00000000,?,?,00854EDD,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854EC0
                            • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854EFD
                              • Part of subcall function 00854E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00893CDE,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E62
                              • Part of subcall function 00854E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00854E74
                              • Part of subcall function 00854E59: FreeLibrary.KERNEL32(00000000,?,?,00893CDE,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E87
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Library$Load$AddressFreeProc
                            • String ID:
                            • API String ID: 2632591731-0
                            • Opcode ID: cd2cf7f163b6e9abd87c4e88a9a70924728d590326450ee87ef305ed4fc9c011
                            • Instruction ID: bd3f4df313ddc7a0323ad5c46c9fae11bb82508a6123ffbf5389352d12783fb4
                            • Opcode Fuzzy Hash: cd2cf7f163b6e9abd87c4e88a9a70924728d590326450ee87ef305ed4fc9c011
                            • Instruction Fuzzy Hash: C911E332600605ABCF24BB6CDC13FAD77A5FF4071AF10842DF942EA1D1EE709A899B51
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __wsopen_s
                            • String ID:
                            • API String ID: 3347428461-0
                            • Opcode ID: 02bf802346df548a213740354bd61189b257815e0dbd3c41a9a0867d54eb39a0
                            • Instruction ID: b5e10d4b45744550812fa8d3de41af8f84080d82c578e6552d7f3f1a7a5c5cec
                            • Opcode Fuzzy Hash: 02bf802346df548a213740354bd61189b257815e0dbd3c41a9a0867d54eb39a0
                            • Instruction Fuzzy Hash: EB11067690410AEFCF15DF58E94199A7BF9FF48314F144059F808EB312DB31DA118BA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                            • Instruction ID: 3b00d03922d8b7820e6551b3498ed32fffb00aaf40665c03673758422cc00cf7
                            • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                            • Instruction Fuzzy Hash: 01F0F432510A14A6C6313E6E8C05B5A3798FF76334F208755F929D22D6DB74D801C6A7
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,?,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6,?,00851129), ref: 00883852
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 4cad863c23c261653b21aef8fbf53778da00eab7eca272898e0b51c1e6b84a90
                            • Instruction ID: e5904fa316d059f93e40a3773355a2e496399d3bcf7acdcbf3d6bda801eec92e
                            • Opcode Fuzzy Hash: 4cad863c23c261653b21aef8fbf53778da00eab7eca272898e0b51c1e6b84a90
                            • Instruction Fuzzy Hash: 7DE0E53120122457D631376B9C05B9A3649FB42FB0F150030BC18E6591DB60DE0193E1
                            APIs
                            • _free.LIBCMT ref: 00884D9C
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorFreeHeapLast_free
                            • String ID:
                            • API String ID: 1353095263-0
                            • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                            • Instruction ID: db13b32a872c9aee175a11ccb78428b5b8390af936c4890fa2b09c296da5c0f0
                            • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                            • Instruction Fuzzy Hash: 3BE092371003059F8720DF6CD800A82BBF4FF843207208529E89DD3311D331E812CB80
                            APIs
                            • FreeLibrary.KERNEL32(?,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854F6D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: 47740a7520f508f42649456980ca6edf7bd306bf88301786b2bb0b878e709e2e
                            • Instruction ID: b035e12f0f3c71a1b4c942001cedcc2b1387863d1011a44d3e9073a945ac0ef3
                            • Opcode Fuzzy Hash: 47740a7520f508f42649456980ca6edf7bd306bf88301786b2bb0b878e709e2e
                            • Instruction Fuzzy Hash: 9CF01571505752CFDB349F68D490862BBE4FF1432E324996EE9EAC6621CB319888DF10
                            APIs
                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00852DC4
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LongNamePath_wcslen
                            • String ID:
                            • API String ID: 541455249-0
                            • Opcode ID: f1cd863b75efc649269626d1e705775f14000ace2cffa9feb4559280f18a4090
                            • Instruction ID: 70a3539969695c3d0d0f9d06e384632118d54ab5880283fb6307f414d122d370
                            • Opcode Fuzzy Hash: f1cd863b75efc649269626d1e705775f14000ace2cffa9feb4559280f18a4090
                            • Instruction Fuzzy Hash: A1E0CD72A041245BCB10A25C9C06FEA77DDFFC9791F040071FD09D7248EA70AD848551
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __fread_nolock
                            • String ID:
                            • API String ID: 2638373210-0
                            • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                            • Instruction ID: 197f1f679c43fa535009023f031eeab65118fe2fbf3b4c33f51906c33c20be21
                            • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                            • Instruction Fuzzy Hash: D7E048B06097005FDF395A28A851BB777E5EF49300F04446EF59FC2252E5726845875D
                            APIs
                              • Part of subcall function 00853837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00853908
                              • Part of subcall function 0085D730: GetInputState.USER32 ref: 0085D807
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00852B6B
                              • Part of subcall function 008530F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0085314E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$CurrentDirectoryInputState
                            • String ID:
                            • API String ID: 3667716007-0
                            • Opcode ID: 3dc22def5ac45dd5a3aba1252e7d6ace440fbd0a16a6b6ce24b1c0005614ef20
                            • Instruction ID: 32d31a8b48022a9102a27f192b8a12b18a2afa7eff89e75827f60b8d11c4e080
                            • Opcode Fuzzy Hash: 3dc22def5ac45dd5a3aba1252e7d6ace440fbd0a16a6b6ce24b1c0005614ef20
                            • Instruction Fuzzy Hash: FDE0262270434402C618BB3CA8524BDA759FBE5393F40043EF846C31B3CE20454E8213
                            APIs
                            • CreateFileW.KERNELBASE(00000000,00000000,?,00890704,?,?,00000000,?,00890704,00000000,0000000C), ref: 008903B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: 5fc5336c3e8dbe993cde5b8fd61c6a61a793d21261a7c950aeff095034d058a6
                            • Instruction ID: d1f0ecff9bd0d5901b372f9315e73752c718851f042c3388be659021a5942ea7
                            • Opcode Fuzzy Hash: 5fc5336c3e8dbe993cde5b8fd61c6a61a793d21261a7c950aeff095034d058a6
                            • Instruction Fuzzy Hash: E0D06C3204014DBBDF028F84DD46EDA3FAAFB48714F014000BE1856020C732E822AB91
                            APIs
                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00851CBC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: InfoParametersSystem
                            • String ID:
                            • API String ID: 3098949447-0
                            • Opcode ID: 1db65e61a8db2c3ede4ab3c7e592d432ae4a9b8d9f010edd6a272afbfe418196
                            • Instruction ID: e1dfc4f1f91586cc3e6a4e4dd193fef67979d819c10dc49ebb6685a75ac26704
                            • Opcode Fuzzy Hash: 1db65e61a8db2c3ede4ab3c7e592d432ae4a9b8d9f010edd6a272afbfe418196
                            • Instruction Fuzzy Hash: E7C09236298348BFF3248B80BC8AF107765B35CB00F048001F609A95E3C3A22822FA90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction ID: eba3f879eedb5d4158f411efb662bb6acdd9a5dd59ad1980f69b6af5ab155623
                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction Fuzzy Hash: 2131E275A00109DBD718CF59E480969FBA6FF49304B2686A5EA09CF656D731EEC1CBC0
                            APIs
                            • Sleep.KERNELBASE(000001F4), ref: 01BE22B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2200794064.0000000001BE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01BE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1be0000_shipping advice.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction ID: f3177b767bb7d58cc0dbecb688d9ddf444cef38df2205391d62be48b9ae248fe
                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction Fuzzy Hash: E9E0BF7494010E9FDB00EFA4D54969E7BB4EF04301F1001A1FD0192281D73199508A62
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 008E961A
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008E965B
                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 008E969F
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008E96C9
                            • SendMessageW.USER32 ref: 008E96F2
                            • GetKeyState.USER32(00000011), ref: 008E978B
                            • GetKeyState.USER32(00000009), ref: 008E9798
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008E97AE
                            • GetKeyState.USER32(00000010), ref: 008E97B8
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008E97E9
                            • SendMessageW.USER32 ref: 008E9810
                            • SendMessageW.USER32(?,00001030,?,008E7E95), ref: 008E9918
                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 008E992E
                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 008E9941
                            • SetCapture.USER32(?), ref: 008E994A
                            • ClientToScreen.USER32(?,?), ref: 008E99AF
                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008E99BC
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008E99D6
                            • ReleaseCapture.USER32 ref: 008E99E1
                            • GetCursorPos.USER32(?), ref: 008E9A19
                            • ScreenToClient.USER32(?,?), ref: 008E9A26
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 008E9A80
                            • SendMessageW.USER32 ref: 008E9AAE
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 008E9AEB
                            • SendMessageW.USER32 ref: 008E9B1A
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 008E9B3B
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 008E9B4A
                            • GetCursorPos.USER32(?), ref: 008E9B68
                            • ScreenToClient.USER32(?,?), ref: 008E9B75
                            • GetParent.USER32(?), ref: 008E9B93
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 008E9BFA
                            • SendMessageW.USER32 ref: 008E9C2B
                            • ClientToScreen.USER32(?,?), ref: 008E9C84
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 008E9CB4
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 008E9CDE
                            • SendMessageW.USER32 ref: 008E9D01
                            • ClientToScreen.USER32(?,?), ref: 008E9D4E
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 008E9D82
                              • Part of subcall function 00869944: GetWindowLongW.USER32(?,000000EB), ref: 00869952
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E9E05
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3429851547-4164748364
                            • Opcode ID: ec08ca33992053f4e1b4814160cdc2fca037201e985d66b7278969f319743adf
                            • Instruction ID: ff3763fbea3df00a3b6d2774ec1e8c68e4c8c9f7a270b7ced949325e5df8fc88
                            • Opcode Fuzzy Hash: ec08ca33992053f4e1b4814160cdc2fca037201e985d66b7278969f319743adf
                            • Instruction Fuzzy Hash: F4428E34604281AFD724CF69CC84AAABBF5FF5A314F10061EF999C72B1D7B1A865CB41
                            APIs
                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008E48F3
                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 008E4908
                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 008E4927
                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 008E494B
                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 008E495C
                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 008E497B
                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008E49AE
                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008E49D4
                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 008E4A0F
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 008E4A56
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 008E4A7E
                            • IsMenu.USER32(?), ref: 008E4A97
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008E4AF2
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008E4B20
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E4B94
                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 008E4BE3
                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 008E4C82
                            • wsprintfW.USER32 ref: 008E4CAE
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008E4CC9
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 008E4CF1
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008E4D13
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008E4D33
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 008E4D5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                            • String ID: %d/%02d/%02d
                            • API String ID: 4054740463-328681919
                            • Opcode ID: 731eba08a4a07c660d4b6858a27c134295e4ca0d0cbb876a40a8c6b80dfcfc93
                            • Instruction ID: 31626675e3910b8d3306146c13378090bfb15709f5ca6377eca5a1db4681ffe0
                            • Opcode Fuzzy Hash: 731eba08a4a07c660d4b6858a27c134295e4ca0d0cbb876a40a8c6b80dfcfc93
                            • Instruction Fuzzy Hash: 0012E271A00298ABEB248F29CC49FAE7BF8FF46714F105129F919DB2E1DB749941CB50
                            APIs
                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0086F998
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008AF474
                            • IsIconic.USER32(00000000), ref: 008AF47D
                            • ShowWindow.USER32(00000000,00000009), ref: 008AF48A
                            • SetForegroundWindow.USER32(00000000), ref: 008AF494
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008AF4AA
                            • GetCurrentThreadId.KERNEL32 ref: 008AF4B1
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008AF4BD
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 008AF4CE
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 008AF4D6
                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 008AF4DE
                            • SetForegroundWindow.USER32(00000000), ref: 008AF4E1
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 008AF4F6
                            • keybd_event.USER32(00000012,00000000), ref: 008AF501
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 008AF50B
                            • keybd_event.USER32(00000012,00000000), ref: 008AF510
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 008AF519
                            • keybd_event.USER32(00000012,00000000), ref: 008AF51E
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 008AF528
                            • keybd_event.USER32(00000012,00000000), ref: 008AF52D
                            • SetForegroundWindow.USER32(00000000), ref: 008AF530
                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 008AF557
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 4125248594-2988720461
                            • Opcode ID: 6bdc06ef694f548b3ef5d0190fd91d18f2e80c1842b437e980a3ad02ae55ff9a
                            • Instruction ID: b1a53b794d3929dedec59385fe937bc2912ed291837e71dbffada6afb0a84d6c
                            • Opcode Fuzzy Hash: 6bdc06ef694f548b3ef5d0190fd91d18f2e80c1842b437e980a3ad02ae55ff9a
                            • Instruction Fuzzy Hash: AC310D71E40258BFFB216BE55C8AFBF7E6DFB45B50F100069FA01EA1D1C6B15901AA60
                            APIs
                              • Part of subcall function 008B16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008B170D
                              • Part of subcall function 008B16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008B173A
                              • Part of subcall function 008B16C3: GetLastError.KERNEL32 ref: 008B174A
                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 008B1286
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008B12A8
                            • CloseHandle.KERNEL32(?), ref: 008B12B9
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008B12D1
                            • GetProcessWindowStation.USER32 ref: 008B12EA
                            • SetProcessWindowStation.USER32(00000000), ref: 008B12F4
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 008B1310
                              • Part of subcall function 008B10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008B11FC), ref: 008B10D4
                              • Part of subcall function 008B10BF: CloseHandle.KERNEL32(?,?,008B11FC), ref: 008B10E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                            • String ID: $default$winsta0
                            • API String ID: 22674027-1027155976
                            • Opcode ID: bbfe40be0e1ba64f655694819124454dc6ec9115a7a3062f55350c24ca74276c
                            • Instruction ID: 9d04ecf43f788ac862503e00928fdefbf5ba17e9520d5ba50a7b2a3e6d82c527
                            • Opcode Fuzzy Hash: bbfe40be0e1ba64f655694819124454dc6ec9115a7a3062f55350c24ca74276c
                            • Instruction Fuzzy Hash: FC818B71900249AFDF219FA8DC99BEF7BBAFF04704F144129F910EA2A0DB318945CB25
                            APIs
                              • Part of subcall function 008B10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B1114
                              • Part of subcall function 008B10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1120
                              • Part of subcall function 008B10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B112F
                              • Part of subcall function 008B10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1136
                              • Part of subcall function 008B10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008B0BCC
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008B0C00
                            • GetLengthSid.ADVAPI32(?), ref: 008B0C17
                            • GetAce.ADVAPI32(?,00000000,?), ref: 008B0C51
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008B0C6D
                            • GetLengthSid.ADVAPI32(?), ref: 008B0C84
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008B0C8C
                            • HeapAlloc.KERNEL32(00000000), ref: 008B0C93
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008B0CB4
                            • CopySid.ADVAPI32(00000000), ref: 008B0CBB
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008B0CEA
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008B0D0C
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008B0D1E
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0D45
                            • HeapFree.KERNEL32(00000000), ref: 008B0D4C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0D55
                            • HeapFree.KERNEL32(00000000), ref: 008B0D5C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0D65
                            • HeapFree.KERNEL32(00000000), ref: 008B0D6C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 008B0D78
                            • HeapFree.KERNEL32(00000000), ref: 008B0D7F
                              • Part of subcall function 008B1193: GetProcessHeap.KERNEL32(00000008,008B0BB1,?,00000000,?,008B0BB1,?), ref: 008B11A1
                              • Part of subcall function 008B1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,008B0BB1,?), ref: 008B11A8
                              • Part of subcall function 008B1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008B0BB1,?), ref: 008B11B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: 63cee6cb4b80152fb10c4070d52d86505dc57974d6b76ce5befe1cf3e98fc000
                            • Instruction ID: cdd5b1590030630495c92f8c976330debe363c9fe14196bf3f8e274c78be9790
                            • Opcode Fuzzy Hash: 63cee6cb4b80152fb10c4070d52d86505dc57974d6b76ce5befe1cf3e98fc000
                            • Instruction Fuzzy Hash: 8B713C7190024AABDF10DFA4DC84BEFBBB9FF05310F144615E915EA2A1D775AA06CF60
                            APIs
                            • OpenClipboard.USER32(008ECC08), ref: 008CEB29
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 008CEB37
                            • GetClipboardData.USER32(0000000D), ref: 008CEB43
                            • CloseClipboard.USER32 ref: 008CEB4F
                            • GlobalLock.KERNEL32(00000000), ref: 008CEB87
                            • CloseClipboard.USER32 ref: 008CEB91
                            • GlobalUnlock.KERNEL32(00000000,00000000), ref: 008CEBBC
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 008CEBC9
                            • GetClipboardData.USER32(00000001), ref: 008CEBD1
                            • GlobalLock.KERNEL32(00000000), ref: 008CEBE2
                            • GlobalUnlock.KERNEL32(00000000,?), ref: 008CEC22
                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 008CEC38
                            • GetClipboardData.USER32(0000000F), ref: 008CEC44
                            • GlobalLock.KERNEL32(00000000), ref: 008CEC55
                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 008CEC77
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008CEC94
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008CECD2
                            • GlobalUnlock.KERNEL32(00000000,?,?), ref: 008CECF3
                            • CountClipboardFormats.USER32 ref: 008CED14
                            • CloseClipboard.USER32 ref: 008CED59
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                            • String ID:
                            • API String ID: 420908878-0
                            • Opcode ID: 22bdb3081097f46e92f814774c817c52e52886ca115e75acdc165386b3f5bce9
                            • Instruction ID: d5d415a22575aa8828287e2b1c726575ba4acb479a1e5fd1199e4b77de290a12
                            • Opcode Fuzzy Hash: 22bdb3081097f46e92f814774c817c52e52886ca115e75acdc165386b3f5bce9
                            • Instruction Fuzzy Hash: ED617734204245AFD310EF28D885F6ABBB8FB84714F14451DF956DB2A2DB31DD0ACBA2
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 008C69BE
                            • FindClose.KERNEL32(00000000), ref: 008C6A12
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008C6A4E
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008C6A75
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 008C6AB2
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 008C6ADF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                            • API String ID: 3830820486-3289030164
                            • Opcode ID: d3adf666ec808c9fbe3c85e8f0987638fcacff1e4e3e72d9a7f495b89f477911
                            • Instruction ID: 927702f37b5fd42b8f7ea4532f135a67be9953250499426a784d5e3abb1cf7eb
                            • Opcode Fuzzy Hash: d3adf666ec808c9fbe3c85e8f0987638fcacff1e4e3e72d9a7f495b89f477911
                            • Instruction Fuzzy Hash: 6BD13071908340AEC714EBA4D882EABB7E8FF88705F44491DF985D7191EB74DA48CB63
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008C9663
                            • GetFileAttributesW.KERNEL32(?), ref: 008C96A1
                            • SetFileAttributesW.KERNEL32(?,?), ref: 008C96BB
                            • FindNextFileW.KERNEL32(00000000,?), ref: 008C96D3
                            • FindClose.KERNEL32(00000000), ref: 008C96DE
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 008C96FA
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C974A
                            • SetCurrentDirectoryW.KERNEL32(00916B7C), ref: 008C9768
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 008C9772
                            • FindClose.KERNEL32(00000000), ref: 008C977F
                            • FindClose.KERNEL32(00000000), ref: 008C978F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1409584000-438819550
                            • Opcode ID: 588bd3c81ad3df756ae4161515435b2a4961c048ec0d06ea9367d03ff590bb7e
                            • Instruction ID: 169e640ccb46a3cabdc4c42c7929d156177b2551262ca4295ebd8207e81c4728
                            • Opcode Fuzzy Hash: 588bd3c81ad3df756ae4161515435b2a4961c048ec0d06ea9367d03ff590bb7e
                            • Instruction Fuzzy Hash: 3731DF32A462496ACB10AFB4DC4DEDE37BCFF49320F104099E955E21A0DB75DE818A14
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008C97BE
                            • FindNextFileW.KERNEL32(00000000,?), ref: 008C9819
                            • FindClose.KERNEL32(00000000), ref: 008C9824
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 008C9840
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C9890
                            • SetCurrentDirectoryW.KERNEL32(00916B7C), ref: 008C98AE
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 008C98B8
                            • FindClose.KERNEL32(00000000), ref: 008C98C5
                            • FindClose.KERNEL32(00000000), ref: 008C98D5
                              • Part of subcall function 008BDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 008BDB00
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 2640511053-438819550
                            • Opcode ID: 62190b6de988c5a9a487d9ef3371d3d407c980a7879ce107149b30aafb4b4b3e
                            • Instruction ID: b4641071cca53eb72ec154b071d01c7eb4d4938e18423bbfafb2a02dcbb9c265
                            • Opcode Fuzzy Hash: 62190b6de988c5a9a487d9ef3371d3d407c980a7879ce107149b30aafb4b4b3e
                            • Instruction Fuzzy Hash: B431D23294425D6ADB10AFA4DC49EDE37BCFF46324F1041A9E994E3190DB71DE858A24
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 008C8257
                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 008C8267
                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008C8273
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008C8310
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8324
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8356
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008C838C
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CurrentDirectoryTime$File$Local$System
                            • String ID: *.*
                            • API String ID: 1464919966-438819550
                            • Opcode ID: 9e14c322f0f424443d611ea19852cd13854b7f617acec9709dac6268229a198a
                            • Instruction ID: 2ca4a2d87d0c044793e79b4c2b96d9128d3aad2165d24a5072bc1a5f3aac4696
                            • Opcode Fuzzy Hash: 9e14c322f0f424443d611ea19852cd13854b7f617acec9709dac6268229a198a
                            • Instruction Fuzzy Hash: BA6138725043459FC710EF64C884A9EB3E8FF89315F04891EF999D7251EB31E949CB92
                            APIs
                              • Part of subcall function 00853AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853A97,?,?,00852E7F,?,?,?,00000000), ref: 00853AC2
                              • Part of subcall function 008BE199: GetFileAttributesW.KERNEL32(?,008BCF95), ref: 008BE19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 008BD122
                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 008BD1DD
                            • MoveFileW.KERNEL32(?,?), ref: 008BD1F0
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 008BD20D
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BD237
                              • Part of subcall function 008BD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,008BD21C,?,?), ref: 008BD2B2
                            • FindClose.KERNEL32(00000000,?,?,?), ref: 008BD253
                            • FindClose.KERNEL32(00000000), ref: 008BD264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                            • String ID: \*.*
                            • API String ID: 1946585618-1173974218
                            • Opcode ID: d09a2b48feed48b2bf4296eaa748dfecb75319bbbafd47e957c1c72f8c817bae
                            • Instruction ID: 2499c3df0fe0ccfac3c254f65b485a29011bcdb325db9560c1797a8de5e17bc7
                            • Opcode Fuzzy Hash: d09a2b48feed48b2bf4296eaa748dfecb75319bbbafd47e957c1c72f8c817bae
                            • Instruction Fuzzy Hash: 13615D31C0124DAACF05EBA8D9929EDB7B5FF15301F644165E841B7292EB31AF09CB62
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: b07e4050c944674abb5dcf0727eb96aa1fd73668cd6d0709c4d92c4d21a6cd23
                            • Instruction ID: 82cec62c12b928c9a5065ec72afc0e543696bcb9d2c999122cdee7a6d1edcc37
                            • Opcode Fuzzy Hash: b07e4050c944674abb5dcf0727eb96aa1fd73668cd6d0709c4d92c4d21a6cd23
                            • Instruction Fuzzy Hash: A1417531604251AFE720DF19D888F1ABBA1FB44368F14C09DE82A8B662C735EC42CB90
                            APIs
                              • Part of subcall function 008B16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008B170D
                              • Part of subcall function 008B16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008B173A
                              • Part of subcall function 008B16C3: GetLastError.KERNEL32 ref: 008B174A
                            • ExitWindowsEx.USER32(?,00000000), ref: 008BE932
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                            • String ID: $ $@$SeShutdownPrivilege
                            • API String ID: 2234035333-3163812486
                            • Opcode ID: 8c5e32ec0f2a1638288ed8958eecb72a9998610e566eb5c366c30700f292c745
                            • Instruction ID: f68e46255ac69200538a12df899eb260f46a42d16084a596aa4685e440fb4e58
                            • Opcode Fuzzy Hash: 8c5e32ec0f2a1638288ed8958eecb72a9998610e566eb5c366c30700f292c745
                            • Instruction Fuzzy Hash: E201D673B10315AFEB5826B89C8ABFF769CF714754F150422F913E63D1D6A06C488190
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008D1276
                            • WSAGetLastError.WSOCK32 ref: 008D1283
                            • bind.WSOCK32(00000000,?,00000010), ref: 008D12BA
                            • WSAGetLastError.WSOCK32 ref: 008D12C5
                            • closesocket.WSOCK32(00000000), ref: 008D12F4
                            • listen.WSOCK32(00000000,00000005), ref: 008D1303
                            • WSAGetLastError.WSOCK32 ref: 008D130D
                            • closesocket.WSOCK32(00000000), ref: 008D133C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$closesocket$bindlistensocket
                            • String ID:
                            • API String ID: 540024437-0
                            • Opcode ID: 6c0af6c00e83897c8d8d7b2ede5681b72f20620246983c3c4146b586d3d3e100
                            • Instruction ID: da40105d2fb1496729e739453fd84a773f0f52a3a7804b36308e0943d9b60423
                            • Opcode Fuzzy Hash: 6c0af6c00e83897c8d8d7b2ede5681b72f20620246983c3c4146b586d3d3e100
                            • Instruction Fuzzy Hash: 74417231A00150AFDB14DF68C588B29B7E5FF46318F188199D856CF396C771ED86CBA1
                            APIs
                            • _free.LIBCMT ref: 0088B9D4
                            • _free.LIBCMT ref: 0088B9F8
                            • _free.LIBCMT ref: 0088BB7F
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,008F3700), ref: 0088BB91
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0092121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0088BC09
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00921270,000000FF,?,0000003F,00000000,?), ref: 0088BC36
                            • _free.LIBCMT ref: 0088BD4B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                            • String ID:
                            • API String ID: 314583886-0
                            • Opcode ID: a2e1be25ef99a43df7a58539c79f9278394dd3b7b655b630f300cba7efe978a3
                            • Instruction ID: b33a8931ff0fdee02f8431dc650d573b92b2ec40265ed7e0808d1efc4b84db6d
                            • Opcode Fuzzy Hash: a2e1be25ef99a43df7a58539c79f9278394dd3b7b655b630f300cba7efe978a3
                            • Instruction Fuzzy Hash: 16C12771904219AFCB24FF789C41BAE7BB9FF91320F1441AAE494D7252EB309E42C751
                            APIs
                              • Part of subcall function 00853AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853A97,?,?,00852E7F,?,?,?,00000000), ref: 00853AC2
                              • Part of subcall function 008BE199: GetFileAttributesW.KERNEL32(?,008BCF95), ref: 008BE19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 008BD420
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 008BD470
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BD481
                            • FindClose.KERNEL32(00000000), ref: 008BD498
                            • FindClose.KERNEL32(00000000), ref: 008BD4A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                            • String ID: \*.*
                            • API String ID: 2649000838-1173974218
                            • Opcode ID: b0503d4dd6d33d9ae255d00f5a7d54e39913d19bb70f92d783bbc14258dee601
                            • Instruction ID: f4f9e1e602e977bc54918b25d00f8494cfa7a71ba81583b58211eb7d9188a2ab
                            • Opcode Fuzzy Hash: b0503d4dd6d33d9ae255d00f5a7d54e39913d19bb70f92d783bbc14258dee601
                            • Instruction Fuzzy Hash: 45314F71408385ABC205EF68D8918EF7BE8FE91315F444A2DF8D5D3291EB20AA0D8767
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: 3387205ad46ea6adc254d7d264048c182ad1b98762537a2ddbb3529923c8df13
                            • Instruction ID: e5367761ed19d71be13cd84750643968a1cdffb596eeb403f6f9c387bb8704ad
                            • Opcode Fuzzy Hash: 3387205ad46ea6adc254d7d264048c182ad1b98762537a2ddbb3529923c8df13
                            • Instruction Fuzzy Hash: A3C23A71E086298FDB25EE28DD407EAB7B5FB48305F1441EAD94DE7241E778AE818F40
                            APIs
                            • _wcslen.LIBCMT ref: 008C64DC
                            • CoInitialize.OLE32(00000000), ref: 008C6639
                            • CoCreateInstance.OLE32(008EFCF8,00000000,00000001,008EFB68,?), ref: 008C6650
                            • CoUninitialize.OLE32 ref: 008C68D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: 441b5a77c24d0b7887f42bf30dfdeb6675273e24238c35a690085d53bdf676f0
                            • Instruction ID: f83fbfd2ebf077dfdc87380247d646d9dc128b23115320e2930522e1eafbeabf
                            • Opcode Fuzzy Hash: 441b5a77c24d0b7887f42bf30dfdeb6675273e24238c35a690085d53bdf676f0
                            • Instruction Fuzzy Hash: 2BD12771508201AFC304EF28C881E6BB7E9FF94705F50496DF995CB291EB70E909CB92
                            APIs
                            • GetForegroundWindow.USER32(?,?,00000000), ref: 008D22E8
                              • Part of subcall function 008CE4EC: GetWindowRect.USER32(?,?), ref: 008CE504
                            • GetDesktopWindow.USER32 ref: 008D2312
                            • GetWindowRect.USER32(00000000), ref: 008D2319
                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 008D2355
                            • GetCursorPos.USER32(?), ref: 008D2381
                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008D23DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                            • String ID:
                            • API String ID: 2387181109-0
                            • Opcode ID: d4dfc5421607b7a6438de21a8600cb292931e92c68ebd8bd03e28279cfb70be2
                            • Instruction ID: 5c3b3ae3f04c24056a1ad8613626f0832235391247ac2932a2642bbd0c127b7a
                            • Opcode Fuzzy Hash: d4dfc5421607b7a6438de21a8600cb292931e92c68ebd8bd03e28279cfb70be2
                            • Instruction Fuzzy Hash: 7631EF72504345AFC724DF18C844B9BBBA9FF94314F000A1AF884DB291DB34E909CB92
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 008C9B78
                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 008C9C8B
                              • Part of subcall function 008C3874: GetInputState.USER32 ref: 008C38CB
                              • Part of subcall function 008C3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008C3966
                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 008C9BA8
                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 008C9C75
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                            • String ID: *.*
                            • API String ID: 1972594611-438819550
                            • Opcode ID: fbdfe1795e6e7539132ba64c1529ced1560338b468a8c69d9cf3bb4d692a6d71
                            • Instruction ID: aeded637f8d62d8cf9953564aad7c9bc2aba1213738af659feb4bea88fd0633b
                            • Opcode Fuzzy Hash: fbdfe1795e6e7539132ba64c1529ced1560338b468a8c69d9cf3bb4d692a6d71
                            • Instruction Fuzzy Hash: 33414E7190420AABCF14DF68C889FEE7BB4FF05311F2441A9E855E6291EB31DE85CB61
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00869A4E
                            • GetSysColor.USER32(0000000F), ref: 00869B23
                            • SetBkColor.GDI32(?,00000000), ref: 00869B36
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Color$LongProcWindow
                            • String ID:
                            • API String ID: 3131106179-0
                            • Opcode ID: e0c7374d9412f3834f74478272ead402ab8b806963c1e0edb78322e0adba2f4f
                            • Instruction ID: bcd89e9f75f5340c7504b94fdb8d4a7d44244c0e9f1e82511e8ceaa910ee6009
                            • Opcode Fuzzy Hash: e0c7374d9412f3834f74478272ead402ab8b806963c1e0edb78322e0adba2f4f
                            • Instruction Fuzzy Hash: 26A14970208468BEF7399A7D9C88E7B3ADDFB43315F16011AF582C6AD1CA359D01E672
                            APIs
                              • Part of subcall function 008D304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008D307A
                              • Part of subcall function 008D304E: _wcslen.LIBCMT ref: 008D309B
                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 008D185D
                            • WSAGetLastError.WSOCK32 ref: 008D1884
                            • bind.WSOCK32(00000000,?,00000010), ref: 008D18DB
                            • WSAGetLastError.WSOCK32 ref: 008D18E6
                            • closesocket.WSOCK32(00000000), ref: 008D1915
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 1601658205-0
                            • Opcode ID: 421796f9ee9e85d35900e7780f4cd61fccd08db7d15c22e2e742072957ce392f
                            • Instruction ID: 3355514b1d98be940bfe2299b908229983eb34499fd228f654bca243be630863
                            • Opcode Fuzzy Hash: 421796f9ee9e85d35900e7780f4cd61fccd08db7d15c22e2e742072957ce392f
                            • Instruction Fuzzy Hash: D0519171A00210AFDB10EF28C886F6A77A5FF44718F488159F9459F393DB71AD418BA2
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: 88e0c36d78d323b2db396726a03967285c496545898170765db558c3fe9f2b10
                            • Instruction ID: 2c0c4a35d1dbec4efed7ab83aa63c31aa730b5c33c24c9c9fbce9754c695b6ec
                            • Opcode Fuzzy Hash: 88e0c36d78d323b2db396726a03967285c496545898170765db558c3fe9f2b10
                            • Instruction Fuzzy Hash: 7521A6317402915FDB208F1BC888B6A7BE5FF96315B298068E845CB351CB71EC42CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                            • API String ID: 0-1546025612
                            • Opcode ID: 73bdd8bba964870288a7d829a570875b07bf3e6959103f612ecb3743cb1d86f3
                            • Instruction ID: e4210e6514604a9d44a58982d8d4ab69092a000309845687656892cdb1ded013
                            • Opcode Fuzzy Hash: 73bdd8bba964870288a7d829a570875b07bf3e6959103f612ecb3743cb1d86f3
                            • Instruction Fuzzy Hash: 55A26C70A0061ACBDF25DF58C8807AEB7B1FF54315F2881AAEC15E7285EB309D95CB90
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 008DA6AC
                            • Process32FirstW.KERNEL32(00000000,?), ref: 008DA6BA
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • Process32NextW.KERNEL32(00000000,?), ref: 008DA79C
                            • CloseHandle.KERNEL32(00000000), ref: 008DA7AB
                              • Part of subcall function 0086CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00893303,?), ref: 0086CE8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                            • String ID:
                            • API String ID: 1991900642-0
                            • Opcode ID: 8e3fb82b348e363b6d692bdda636f58db68fd283a481d980dc51263351958496
                            • Instruction ID: 5616d0cc26c89432a798e14f4a4134579010f3176279294ef095393d74748a08
                            • Opcode Fuzzy Hash: 8e3fb82b348e363b6d692bdda636f58db68fd283a481d980dc51263351958496
                            • Instruction Fuzzy Hash: 48513971508300AFD714EF28C886A6BBBE8FF89754F40492DF995D7252EB30D908CB92
                            APIs
                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 008BAAAC
                            • SetKeyboardState.USER32(00000080), ref: 008BAAC8
                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 008BAB36
                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 008BAB88
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: bc0f14ff5c7fb9fd52f1da1f1b9052927fdc5d2ebdfab34b344e29f2542d45f2
                            • Instruction ID: c4e01f6c5f94ebf19002c9ca5a7b145df75d4b5984c0c640b571205d5b5a0424
                            • Opcode Fuzzy Hash: bc0f14ff5c7fb9fd52f1da1f1b9052927fdc5d2ebdfab34b344e29f2542d45f2
                            • Instruction Fuzzy Hash: 8031FC30A80258AEFF398B648C45BFA7BA6FB45330F04421AF5A1D63D1D3759985C763
                            APIs
                            • InternetReadFile.WININET(?,?,00000400,?), ref: 008CCE89
                            • GetLastError.KERNEL32(?,00000000), ref: 008CCEEA
                            • SetEvent.KERNEL32(?,?,00000000), ref: 008CCEFE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorEventFileInternetLastRead
                            • String ID:
                            • API String ID: 234945975-0
                            • Opcode ID: 4efc25521b44e78b7610ea8b4352838a5533742af46412f77a3588fcf7192764
                            • Instruction ID: ed702c78342ab675914a14bc6c44b342461fa26585c4444b26c5748efd3fc653
                            • Opcode Fuzzy Hash: 4efc25521b44e78b7610ea8b4352838a5533742af46412f77a3588fcf7192764
                            • Instruction Fuzzy Hash: 9521BDB19003059BDB20DF69D988FAA7BF8FB41318F10841EE64AD6151EB70EE458B60
                            APIs
                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008B82AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: ($|
                            • API String ID: 1659193697-1631851259
                            • Opcode ID: 201bdcaf8acf14aadc75bcb35363109867d3c8367fa86656fd934e815e44e157
                            • Instruction ID: e8ed3d7b375d3efc6fe696d0d6b9aeb7ada8cd0f39007efbcf6afb06a05438be
                            • Opcode Fuzzy Hash: 201bdcaf8acf14aadc75bcb35363109867d3c8367fa86656fd934e815e44e157
                            • Instruction Fuzzy Hash: BA322374A00605DFCB28CF59C481AAAB7F4FF48710B15856EE59ADB3A1EB70E981CB44
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 008C5CC1
                            • FindNextFileW.KERNEL32(00000000,?), ref: 008C5D17
                            • FindClose.KERNEL32(?), ref: 008C5D5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstNext
                            • String ID:
                            • API String ID: 3541575487-0
                            • Opcode ID: 333d11c15a50df3bdc5a980e93b5f7d82cfe5092efb5402475f69ddbd5d412d1
                            • Instruction ID: 6bdabe48068c16f1c44fa5cb08e13e6c132a9a87cf236881c03121ced7c0e308
                            • Opcode Fuzzy Hash: 333d11c15a50df3bdc5a980e93b5f7d82cfe5092efb5402475f69ddbd5d412d1
                            • Instruction Fuzzy Hash: 975134746047019FCB14CF28C494E96B7E4FB49314F14856DEA5ACB3A2DB30F945CB92
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 0088271A
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00882724
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00882731
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: 24f5b9c3081ac9de13f2c5a98092b370c51546bb4c9d80320958cc63be0bd1ef
                            • Instruction ID: 69536dbfdf1eb362b57aa0b28a71bba94607984cb553d2ce3aa139c5521fbf31
                            • Opcode Fuzzy Hash: 24f5b9c3081ac9de13f2c5a98092b370c51546bb4c9d80320958cc63be0bd1ef
                            • Instruction Fuzzy Hash: 6831B474951228ABCB21DF68DC89799B7B8FF08310F5081EAE41CA6261E7309F818F45
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 008C51DA
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 008C5238
                            • SetErrorMode.KERNEL32(00000000), ref: 008C52A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID:
                            • API String ID: 1682464887-0
                            • Opcode ID: 7706e981b8d22abbe34e792b4db3c05f1c27a9392499ac3a2005316f54ffb1c2
                            • Instruction ID: a7d1921be01065303bb093da746da55cdc1e5791a400d3b441d2b82db8b4f460
                            • Opcode Fuzzy Hash: 7706e981b8d22abbe34e792b4db3c05f1c27a9392499ac3a2005316f54ffb1c2
                            • Instruction Fuzzy Hash: FA312B75A00618EFDB00DF54D884EADBBF5FF49314F048099E845AB362DB31E85ACB91
                            APIs
                              • Part of subcall function 0086FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00870668
                              • Part of subcall function 0086FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00870685
                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008B170D
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008B173A
                            • GetLastError.KERNEL32 ref: 008B174A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                            • String ID:
                            • API String ID: 577356006-0
                            • Opcode ID: 41171b82b07257459fb3cef301f31d3327dadfad93ddec120bfc93054566bdaa
                            • Instruction ID: 16976320fea10b7356de8c3082a82c98e035a0877bb0f5ed73659cc5e199d06a
                            • Opcode Fuzzy Hash: 41171b82b07257459fb3cef301f31d3327dadfad93ddec120bfc93054566bdaa
                            • Instruction Fuzzy Hash: 9C11C4B1400304AFD7189F58ECC6DAAB7FDFB05714B20852EE05697241EB70FC418B64
                            APIs
                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 008BD608
                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 008BD645
                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 008BD650
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle
                            • String ID:
                            • API String ID: 33631002-0
                            • Opcode ID: ee799be77767c123964fdb2d098fa6cf2a35d8e9d0f7d1c6910fb12f502d56ae
                            • Instruction ID: 3e33697489d376b0d7eece4fdf634ec33fab5cce6d1ae0db413cd42480ab8f9e
                            • Opcode Fuzzy Hash: ee799be77767c123964fdb2d098fa6cf2a35d8e9d0f7d1c6910fb12f502d56ae
                            • Instruction Fuzzy Hash: CD113C75E05228BBDB108F959C85FEFBFBCFB45B50F108115F914E7290D6704A058BA1
                            APIs
                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 008B168C
                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008B16A1
                            • FreeSid.ADVAPI32(?), ref: 008B16B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AllocateCheckFreeInitializeMembershipToken
                            • String ID:
                            • API String ID: 3429775523-0
                            • Opcode ID: d84875000c0757d7cddc3ec76066bbd1182cf84312770456c5de6d306ac8b976
                            • Instruction ID: d43cd6c9c2bc043db2bd80ff6c2925a1e10fed602fd75a98f170505a06ca9a35
                            • Opcode Fuzzy Hash: d84875000c0757d7cddc3ec76066bbd1182cf84312770456c5de6d306ac8b976
                            • Instruction Fuzzy Hash: 01F0F471D50309FBDF00DFE49C89AAEBBBCFB08604F504565E501E6181E774AA448A50
                            APIs
                            • GetCurrentProcess.KERNEL32(008828E9,?,00874CBE,008828E9,009188B8,0000000C,00874E15,008828E9,00000002,00000000,?,008828E9), ref: 00874D09
                            • TerminateProcess.KERNEL32(00000000,?,00874CBE,008828E9,009188B8,0000000C,00874E15,008828E9,00000002,00000000,?,008828E9), ref: 00874D10
                            • ExitProcess.KERNEL32 ref: 00874D22
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: 5b95790a175858f5f8775c022e1d5d50c09498d1f04ce4c4fbecd05fffd57569
                            • Instruction ID: b959eedf9a64113fefead0ded08059d2d7b34bfe9dfe53b756084a2ecb59ba9e
                            • Opcode Fuzzy Hash: 5b95790a175858f5f8775c022e1d5d50c09498d1f04ce4c4fbecd05fffd57569
                            • Instruction Fuzzy Hash: 1FE0B631400188AFCF21AF58DD59A583F69FB41781B118014FC59DA226DB35ED52DB81
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: /
                            • API String ID: 0-2043925204
                            • Opcode ID: 2e817205a83913820b0e00622ac1f69598cafdf863f9fd4b0c559abd1a199acc
                            • Instruction ID: 95059a4d87327cdcbcb64ff77653a0a82f382afdcd141a7ae7475510143b8fab
                            • Opcode Fuzzy Hash: 2e817205a83913820b0e00622ac1f69598cafdf863f9fd4b0c559abd1a199acc
                            • Instruction Fuzzy Hash: B0413B72900219AFCB20AFB9DC49DBB7778FB84314F50426DF905D7284E6709D81CB60
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 008AD28C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID: X64
                            • API String ID: 2645101109-893830106
                            • Opcode ID: 78da82a85cd4f0588946cc355e1215e38897c60d8f55029830fa639df3ed6697
                            • Instruction ID: 2841a95ad1c2f4db1ff8ae0988dee8d3e2f95c0a9d043c414fd11c686af2cabb
                            • Opcode Fuzzy Hash: 78da82a85cd4f0588946cc355e1215e38897c60d8f55029830fa639df3ed6697
                            • Instruction Fuzzy Hash: F6D0C9B580121DEACB90DB90DCC8DD9B37CFB14309F100151F506E2000D73095498F10
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction ID: b8460770012bd0a3510b1e43b0b155baad007088cb1e45424a7de047a286b115
                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction Fuzzy Hash: 5F02FC72E011199BDF24CFA9D8806ADBBF1FF88314F25816DD919E7384D731AA418B94
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 008C6918
                            • FindClose.KERNEL32(00000000), ref: 008C6961
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 3f924097bba48940ee44b8e40ec677e2d5310eb56a4fe4f12731ad0f38d2a29a
                            • Instruction ID: e695f6756e7413a5312a441fb845c307edbb1ffd7acf453b1d1889e3f838baaf
                            • Opcode Fuzzy Hash: 3f924097bba48940ee44b8e40ec677e2d5310eb56a4fe4f12731ad0f38d2a29a
                            • Instruction Fuzzy Hash: 261181716042009FC710DF29D885E16BBE5FF85329F14C6ADE8698F6A2DB70EC09CB91
                            APIs
                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,008D4891,?,?,00000035,?), ref: 008C37E4
                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,008D4891,?,?,00000035,?), ref: 008C37F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorFormatLastMessage
                            • String ID:
                            • API String ID: 3479602957-0
                            • Opcode ID: 5e17ed44ba9b45d9b991f55adaff880f804d4815162b51231dc9f3ef2e8a7e0f
                            • Instruction ID: 5c94457058a3476e25dadcbf160d4ffb2a5950038541f7dacaec4fb5105a36dc
                            • Opcode Fuzzy Hash: 5e17ed44ba9b45d9b991f55adaff880f804d4815162b51231dc9f3ef2e8a7e0f
                            • Instruction Fuzzy Hash: 8DF0E5B1A043296AEB20276A8C8DFEB3AAEFFC5761F000179F509D2281D9709D05C6B1
                            APIs
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 008BB25D
                            • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 008BB270
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: InputSendkeybd_event
                            • String ID:
                            • API String ID: 3536248340-0
                            • Opcode ID: c04201ab3f26f0576cc66bc8696502b3e7966dd2df004c3c92700ad6a492cc30
                            • Instruction ID: bf7db7b40f8ee3b944be7118b5ee99c69e8b0a706951fab2537cfeba6e9797c0
                            • Opcode Fuzzy Hash: c04201ab3f26f0576cc66bc8696502b3e7966dd2df004c3c92700ad6a492cc30
                            • Instruction Fuzzy Hash: A5F01D7180428DABDB059FA5C805BEE7FB4FF04309F008009F965AA191C379C6119F94
                            APIs
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008B11FC), ref: 008B10D4
                            • CloseHandle.KERNEL32(?,?,008B11FC), ref: 008B10E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AdjustCloseHandlePrivilegesToken
                            • String ID:
                            • API String ID: 81990902-0
                            • Opcode ID: 84134e0629b9767c636ae71b17ef049d1d6ca2d27f6ba586f38a542123a97b32
                            • Instruction ID: 3348fba43b8e91117b5f6620d82442f16fa3a316e1d713cd80fb6b6af944d05d
                            • Opcode Fuzzy Hash: 84134e0629b9767c636ae71b17ef049d1d6ca2d27f6ba586f38a542123a97b32
                            • Instruction Fuzzy Hash: 7CE04F32404600AEE7252B15FC09E737BA9FB04310B10882EF5A5C44B1DB62AC91DB10
                            Strings
                            • Variable is not of type 'Object'., xrefs: 008A0C40
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable is not of type 'Object'.
                            • API String ID: 0-1840281001
                            • Opcode ID: 7eb07c840f35297f2d0e3f2086475cff05265b943791cf13410a352e1db958b6
                            • Instruction ID: f9bfd9aa253e0ee4e0616b71f6e7c2c4663015ff709458eb89aa18566d15d4e9
                            • Opcode Fuzzy Hash: 7eb07c840f35297f2d0e3f2086475cff05265b943791cf13410a352e1db958b6
                            • Instruction Fuzzy Hash: 3E3257709002189FDF14DF94C981AEDB7B5FF05309F244059E806EB292DB75AE4ADF62
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00886766,?,?,00000008,?,?,0088FEFE,00000000), ref: 00886998
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: d63bff7769c014a75ad5eb71b1b113d76eed4d6feaf4d710ba9bcaa2ad5d5c8a
                            • Instruction ID: 96b6707ac04426663c41593e959f682b5f389a6a9274895713cc18c8ae7d3ecb
                            • Opcode Fuzzy Hash: d63bff7769c014a75ad5eb71b1b113d76eed4d6feaf4d710ba9bcaa2ad5d5c8a
                            • Instruction Fuzzy Hash: 3CB15D31610608DFD719DF28C48AB657BE0FF45368F298658E899CF2E2D735E9A1CB40
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: 01dadd771b86459ff8a76c63ad898b4b3a2c901c615a6ce5047af99098bacd0d
                            • Instruction ID: 9494c0909db7131ac0a49bf71b2dc453e77c683a53a5b0d51cda71cee861c364
                            • Opcode Fuzzy Hash: 01dadd771b86459ff8a76c63ad898b4b3a2c901c615a6ce5047af99098bacd0d
                            • Instruction Fuzzy Hash: 4E125F71900229DFDB14CF58C8816AEB7F5FF49714F1581AAE849EB251EB309E81CBA4
                            APIs
                            • BlockInput.USER32(00000001), ref: 008CEABD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: 92280cd5be10543d7abf80b3dd0900ab5cb733e92f1c3c973e57c1a8eee0d09e
                            • Instruction ID: af3c89086aca6edd0e3b25af1da67152cc4e03cd6e2e7e6f3e11021d2dc6a81b
                            • Opcode Fuzzy Hash: 92280cd5be10543d7abf80b3dd0900ab5cb733e92f1c3c973e57c1a8eee0d09e
                            • Instruction Fuzzy Hash: 24E01A312002149FC710EF69D844E9AB7E9FFA8760F00841AFC49CB261DAB0E8458B91
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,008703EE), ref: 008709DA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 7ad8f4dcfc2015d187292f1f22d3907fc2984d5d340dd16141a209263bd1010d
                            • Instruction ID: 09815871041632bb022be69ae91ce603597fb642536b3c72870d89c95620e15a
                            • Opcode Fuzzy Hash: 7ad8f4dcfc2015d187292f1f22d3907fc2984d5d340dd16141a209263bd1010d
                            • Instruction Fuzzy Hash:
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction ID: 735e991d42355cc62bb27e2ecc8f162133922b4edfa48e7e4bd5287c6a04c00b
                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction Fuzzy Hash: 3E517B3160C74996DB38856CC85D7BE6785FB12304F18C539D98EC728EC629DE01D39B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5908e5ae6c6a40f9cc9a5d5fdc1ed1dad3dfb0185f283b1db8b123dcbf8a6916
                            • Instruction ID: f439713f8e28ee57334fcaff0cc04c3175ea0063bfc513022e9a04549e72c663
                            • Opcode Fuzzy Hash: 5908e5ae6c6a40f9cc9a5d5fdc1ed1dad3dfb0185f283b1db8b123dcbf8a6916
                            • Instruction Fuzzy Hash: C8320421D29F014DD723A634D922335A659FFB73C5F25D737E81AB59AAEB29C4838200
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b74c44260275cd8da1d92aef654b9a3ac8a59eca0cb29c494608b406a5ab5372
                            • Instruction ID: 0b7cd8ef6fc4ec82c46cebb989ab828c3214d12032383953101c57480720a3f3
                            • Opcode Fuzzy Hash: b74c44260275cd8da1d92aef654b9a3ac8a59eca0cb29c494608b406a5ab5372
                            • Instruction Fuzzy Hash: 34323631A041198BEF28CF2DC4906BD7BA1FF47314F29816AD89ACBA91E734DD81DB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f696456ad71d0e81e3442aea893117224b7b594857ebfda9f10cfd0f069f417
                            • Instruction ID: 4dc6a2957aedf2a38af4c8f5fb6fbd2655a556ed8babc3d6184038458196bafd
                            • Opcode Fuzzy Hash: 1f696456ad71d0e81e3442aea893117224b7b594857ebfda9f10cfd0f069f417
                            • Instruction Fuzzy Hash: DF22D0B0A04609DFDF14DFA8D881AAEB7B6FF44304F148529E816E7291EB36AD14CB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21713c73751870f58bc696759a7a1e837a1d5ca63f2c770b0d9debd1967d96ea
                            • Instruction ID: 24559fdd0f6996e9326aaa02530c2e0ab46cfb30512c870c753147b39636b4c2
                            • Opcode Fuzzy Hash: 21713c73751870f58bc696759a7a1e837a1d5ca63f2c770b0d9debd1967d96ea
                            • Instruction Fuzzy Hash: 3C02E6B0E00209EBDF04DF58D881AADBBB5FF44304F158169E856DB391EB31EA65CB81
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction ID: 2f8f372a248cdca834c9f9d8ef5b953d180a3bdebd4aa374fa998f0e349f11fb
                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction Fuzzy Hash: 199167732080A349DF29463D857D03DFFE1EA923A531A479DD4FACA9C9FE14C954E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction ID: d0e4c11f63605901d4d9e3907ab9cc45641222b29658425f663ac37ab763b03e
                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction Fuzzy Hash: 309185722090A34ADF29427E857C03DFFE1EA923B1319879DD4FACA9C9FE14C654D620
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 352580e09fe2fb560eb8a6076dd9b97723d4e96d3ed0327229435db459f09512
                            • Instruction ID: 4ba78f4578e7e362e5b342dea6749da8ce1998d664d1735a6dec51aea279e396
                            • Opcode Fuzzy Hash: 352580e09fe2fb560eb8a6076dd9b97723d4e96d3ed0327229435db459f09512
                            • Instruction Fuzzy Hash: 0F61BA3034C709A6EE388A2C8C95BBEA384FF41364F10C91AE94FDB28DD611DE42D756
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0601d5e35f5e8ab12d7a85676727ca0d9c94e1627cdf06cdadbb59052ad32877
                            • Instruction ID: d77633650d9f00718dd73734746cb657d6b1c381db09681ba8dd4aefe06dae6f
                            • Opcode Fuzzy Hash: 0601d5e35f5e8ab12d7a85676727ca0d9c94e1627cdf06cdadbb59052ad32877
                            • Instruction Fuzzy Hash: 41619D3224C709A7DE384A6C4895BBF2B94FF42B08F14C959E94FCB28DE611DD41C356
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction ID: b3c04dcb106ed073bf4d11e2ab05999d833fe0901a2af4695f7919dc44eda376
                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction Fuzzy Hash: 2B8188325080A309DF6D463D857C13EFFE1FA923A131A47ADD4FACA9C9EE24C555E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 55bcd4476535f5aa73e752e033b92711e67056ef03a8f17423f5750d5b400bb2
                            • Instruction ID: accd3432be1b485ccb8dd5db55dcb6ba887d773f94f63062788e8a6879e12775
                            • Opcode Fuzzy Hash: 55bcd4476535f5aa73e752e033b92711e67056ef03a8f17423f5750d5b400bb2
                            • Instruction Fuzzy Hash: D721A5326206158BD728CF79C82267A73E5F764320F25862EE4A7C77D1DE35E904DB80
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 008D2B30
                            • DeleteObject.GDI32(00000000), ref: 008D2B43
                            • DestroyWindow.USER32 ref: 008D2B52
                            • GetDesktopWindow.USER32 ref: 008D2B6D
                            • GetWindowRect.USER32(00000000), ref: 008D2B74
                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 008D2CA3
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 008D2CB1
                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2CF8
                            • GetClientRect.USER32(00000000,?), ref: 008D2D04
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 008D2D40
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2D62
                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2D75
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2D80
                            • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2D89
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2D98
                            • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2DA1
                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2DA8
                            • GlobalFree.KERNEL32(00000000), ref: 008D2DB3
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2DC5
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,008EFC38,00000000), ref: 008D2DDB
                            • GlobalFree.KERNEL32(00000000), ref: 008D2DEB
                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 008D2E11
                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 008D2E30
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D2E52
                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008D303F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 2211948467-2373415609
                            • Opcode ID: cb8af1cf6d30fc98e0f0872f2de9b9d04255b672be408597a8d214c486462577
                            • Instruction ID: 1a8abd157b99da0a400666ed397b015c3d2af167b4f3b1e06b4e4078f1edffa5
                            • Opcode Fuzzy Hash: cb8af1cf6d30fc98e0f0872f2de9b9d04255b672be408597a8d214c486462577
                            • Instruction Fuzzy Hash: 7D025E71900209EFDB14DF68CC89EAE7BB9FB58311F048659F915EB2A1DB749D01CB60
                            APIs
                            • SetTextColor.GDI32(?,00000000), ref: 008E712F
                            • GetSysColorBrush.USER32(0000000F), ref: 008E7160
                            • GetSysColor.USER32(0000000F), ref: 008E716C
                            • SetBkColor.GDI32(?,000000FF), ref: 008E7186
                            • SelectObject.GDI32(?,?), ref: 008E7195
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 008E71C0
                            • GetSysColor.USER32(00000010), ref: 008E71C8
                            • CreateSolidBrush.GDI32(00000000), ref: 008E71CF
                            • FrameRect.USER32(?,?,00000000), ref: 008E71DE
                            • DeleteObject.GDI32(00000000), ref: 008E71E5
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 008E7230
                            • FillRect.USER32(?,?,?), ref: 008E7262
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E7284
                              • Part of subcall function 008E73E8: GetSysColor.USER32(00000012), ref: 008E7421
                              • Part of subcall function 008E73E8: SetTextColor.GDI32(?,?), ref: 008E7425
                              • Part of subcall function 008E73E8: GetSysColorBrush.USER32(0000000F), ref: 008E743B
                              • Part of subcall function 008E73E8: GetSysColor.USER32(0000000F), ref: 008E7446
                              • Part of subcall function 008E73E8: GetSysColor.USER32(00000011), ref: 008E7463
                              • Part of subcall function 008E73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 008E7471
                              • Part of subcall function 008E73E8: SelectObject.GDI32(?,00000000), ref: 008E7482
                              • Part of subcall function 008E73E8: SetBkColor.GDI32(?,00000000), ref: 008E748B
                              • Part of subcall function 008E73E8: SelectObject.GDI32(?,?), ref: 008E7498
                              • Part of subcall function 008E73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008E74B7
                              • Part of subcall function 008E73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008E74CE
                              • Part of subcall function 008E73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008E74DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                            • String ID:
                            • API String ID: 4124339563-0
                            • Opcode ID: 2065c2ffb22a1f27d16b0f99c425dd5db7e407d028ef9175c73248fa683ff3c0
                            • Instruction ID: 456bcbd7fb04b9b48281f1ca8446562ee6d37669826e32be68ae66998b36fef2
                            • Opcode Fuzzy Hash: 2065c2ffb22a1f27d16b0f99c425dd5db7e407d028ef9175c73248fa683ff3c0
                            • Instruction Fuzzy Hash: 2CA1A172408381BFDB109F64DC88E6B7BA9FF49320F100A19FA62DA1E1D771E946DB51
                            APIs
                            • DestroyWindow.USER32(?,?), ref: 00868E14
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 008A6AC5
                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 008A6AFE
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 008A6F43
                              • Part of subcall function 00868F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00868BE8,?,00000000,?,?,?,?,00868BBA,00000000,?), ref: 00868FC5
                            • SendMessageW.USER32(?,00001053), ref: 008A6F7F
                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 008A6F96
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 008A6FAC
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 008A6FB7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                            • String ID: 0
                            • API String ID: 2760611726-4108050209
                            • Opcode ID: c2c7047b45105d940ff5757c59690fbb1860be855cc17b83a1f3e650dc251e88
                            • Instruction ID: 647a55a05646b054d3242f123399a4e6d21a22c729e81c5ad74896ac3dc823e6
                            • Opcode Fuzzy Hash: c2c7047b45105d940ff5757c59690fbb1860be855cc17b83a1f3e650dc251e88
                            • Instruction Fuzzy Hash: 0A12EF34604201DFE725CF18D884BA6B7E1FF5A310F184168F489CBA65DB32ECA2DB91
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 008D273E
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 008D286A
                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008D28A9
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008D28B9
                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 008D2900
                            • GetClientRect.USER32(00000000,?), ref: 008D290C
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 008D2955
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 008D2964
                            • GetStockObject.GDI32(00000011), ref: 008D2974
                            • SelectObject.GDI32(00000000,00000000), ref: 008D2978
                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 008D2988
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008D2991
                            • DeleteDC.GDI32(00000000), ref: 008D299A
                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008D29C6
                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 008D29DD
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 008D2A1D
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 008D2A31
                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 008D2A42
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 008D2A77
                            • GetStockObject.GDI32(00000011), ref: 008D2A82
                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 008D2A8D
                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 008D2A97
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: 03e7dcd20a1ecc36759b109b728c9d85198000ea8382c2b24efa3ed7406371e8
                            • Instruction ID: 5fdea04feee717ecb0b741b90387868ebc8d3f73e5ff3431e5ec7e16ade91421
                            • Opcode Fuzzy Hash: 03e7dcd20a1ecc36759b109b728c9d85198000ea8382c2b24efa3ed7406371e8
                            • Instruction Fuzzy Hash: 84B15D71A00219AFEB24DF68DC89FAE7BA9FB58711F008215F915EB290D774ED41CB90
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 008C4AED
                            • GetDriveTypeW.KERNEL32(?,008ECB68,?,\\.\,008ECC08), ref: 008C4BCA
                            • SetErrorMode.KERNEL32(00000000,008ECB68,?,\\.\,008ECC08), ref: 008C4D36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                            • API String ID: 2907320926-4222207086
                            • Opcode ID: e4f8322a3ec7d99dfe59b4f24f3c107662ba9ccbfffa06afe5ca9a53820f8eb7
                            • Instruction ID: b704c3182e64e54d14938a20b747c1947be7d1d05fade17131ae7dde0c2fb42e
                            • Opcode Fuzzy Hash: e4f8322a3ec7d99dfe59b4f24f3c107662ba9ccbfffa06afe5ca9a53820f8eb7
                            • Instruction Fuzzy Hash: BF61B334B0120D9BCB14DF28D9A2EA977B0FB45358B20501DF806EB2A1DB35DDC1DB42
                            APIs
                            • GetSysColor.USER32(00000012), ref: 008E7421
                            • SetTextColor.GDI32(?,?), ref: 008E7425
                            • GetSysColorBrush.USER32(0000000F), ref: 008E743B
                            • GetSysColor.USER32(0000000F), ref: 008E7446
                            • CreateSolidBrush.GDI32(?), ref: 008E744B
                            • GetSysColor.USER32(00000011), ref: 008E7463
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 008E7471
                            • SelectObject.GDI32(?,00000000), ref: 008E7482
                            • SetBkColor.GDI32(?,00000000), ref: 008E748B
                            • SelectObject.GDI32(?,?), ref: 008E7498
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 008E74B7
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008E74CE
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008E74DB
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008E752A
                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 008E7554
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 008E7572
                            • DrawFocusRect.USER32(?,?), ref: 008E757D
                            • GetSysColor.USER32(00000011), ref: 008E758E
                            • SetTextColor.GDI32(?,00000000), ref: 008E7596
                            • DrawTextW.USER32(?,008E70F5,000000FF,?,00000000), ref: 008E75A8
                            • SelectObject.GDI32(?,?), ref: 008E75BF
                            • DeleteObject.GDI32(?), ref: 008E75CA
                            • SelectObject.GDI32(?,?), ref: 008E75D0
                            • DeleteObject.GDI32(?), ref: 008E75D5
                            • SetTextColor.GDI32(?,?), ref: 008E75DB
                            • SetBkColor.GDI32(?,?), ref: 008E75E5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1996641542-0
                            • Opcode ID: bdc07acb8759d1370d4f5b81a231462958733abb30d3f0befd2bef25a4d4b7c5
                            • Instruction ID: a45418ef19bbcaf242cc1cc96f77fdb5599ca845d4f3d4b2f48ebc3ba4b459ff
                            • Opcode Fuzzy Hash: bdc07acb8759d1370d4f5b81a231462958733abb30d3f0befd2bef25a4d4b7c5
                            • Instruction Fuzzy Hash: 83616B72D00258AFDF019FA4DC89EAEBFB9FB09320F114125F915AB2A1D7719941DF90
                            APIs
                            • GetCursorPos.USER32(?), ref: 008E1128
                            • GetDesktopWindow.USER32 ref: 008E113D
                            • GetWindowRect.USER32(00000000), ref: 008E1144
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E1199
                            • DestroyWindow.USER32(?), ref: 008E11B9
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008E11ED
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E120B
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008E121D
                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 008E1232
                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 008E1245
                            • IsWindowVisible.USER32(00000000), ref: 008E12A1
                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008E12BC
                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008E12D0
                            • GetWindowRect.USER32(00000000,?), ref: 008E12E8
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 008E130E
                            • GetMonitorInfoW.USER32(00000000,?), ref: 008E1328
                            • CopyRect.USER32(?,?), ref: 008E133F
                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 008E13AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                            • String ID: ($0$tooltips_class32
                            • API String ID: 698492251-4156429822
                            • Opcode ID: b71b0704f57dca64d50f344873518d94d6be647d720cc1a8869c0c70a4eaadb7
                            • Instruction ID: 3c395b1e63df26c58f823210c26dee4747fa1d3377d7835bd3e5b47b9f43ef47
                            • Opcode Fuzzy Hash: b71b0704f57dca64d50f344873518d94d6be647d720cc1a8869c0c70a4eaadb7
                            • Instruction Fuzzy Hash: 83B17871604381AFDB14DF69C888A6ABBE4FF85354F00891CF999DB2A1D731E845CB92
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 008E02E5
                            • _wcslen.LIBCMT ref: 008E031F
                            • _wcslen.LIBCMT ref: 008E0389
                            • _wcslen.LIBCMT ref: 008E03F1
                            • _wcslen.LIBCMT ref: 008E0475
                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008E04C5
                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008E0504
                              • Part of subcall function 0086F9F2: _wcslen.LIBCMT ref: 0086F9FD
                              • Part of subcall function 008B223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008B2258
                              • Part of subcall function 008B223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008B228A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$MessageSend$BuffCharUpper
                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                            • API String ID: 1103490817-719923060
                            • Opcode ID: ea959852a5cdbd69705d4682c0dc8d018f2fa40bcafb267a4e610fe8905cfcaf
                            • Instruction ID: 761313aa7b5613d7f23753e7b11089d1f6fc0740033a2b16b74777b23d062286
                            • Opcode Fuzzy Hash: ea959852a5cdbd69705d4682c0dc8d018f2fa40bcafb267a4e610fe8905cfcaf
                            • Instruction Fuzzy Hash: 50E1AF312083858FC714DF29C55096AB7E6FF99318B14495CF896EB3A2DB70ED85CB82
                            APIs
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00868968
                            • GetSystemMetrics.USER32(00000007), ref: 00868970
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0086899B
                            • GetSystemMetrics.USER32(00000008), ref: 008689A3
                            • GetSystemMetrics.USER32(00000004), ref: 008689C8
                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008689E5
                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008689F5
                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00868A28
                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00868A3C
                            • GetClientRect.USER32(00000000,000000FF), ref: 00868A5A
                            • GetStockObject.GDI32(00000011), ref: 00868A76
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00868A81
                              • Part of subcall function 0086912D: GetCursorPos.USER32(?), ref: 00869141
                              • Part of subcall function 0086912D: ScreenToClient.USER32(00000000,?), ref: 0086915E
                              • Part of subcall function 0086912D: GetAsyncKeyState.USER32(00000001), ref: 00869183
                              • Part of subcall function 0086912D: GetAsyncKeyState.USER32(00000002), ref: 0086919D
                            • SetTimer.USER32(00000000,00000000,00000028,008690FC), ref: 00868AA8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                            • String ID: AutoIt v3 GUI
                            • API String ID: 1458621304-248962490
                            • Opcode ID: 0ea3e6d9c54c9ac060fd86c7c5d40d5c5ba7ee3b4d6ac79e21d240dd50a6866d
                            • Instruction ID: efa09f916fdd1328888227156568e655fbb22404b56ade57bf6c252220194088
                            • Opcode Fuzzy Hash: 0ea3e6d9c54c9ac060fd86c7c5d40d5c5ba7ee3b4d6ac79e21d240dd50a6866d
                            • Instruction Fuzzy Hash: F6B17875A0020AEFDB14DFA8DC85BAE3BB5FB48314F154229FA15EB290DB34A851CF51
                            APIs
                              • Part of subcall function 008B10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B1114
                              • Part of subcall function 008B10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1120
                              • Part of subcall function 008B10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B112F
                              • Part of subcall function 008B10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1136
                              • Part of subcall function 008B10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008B0DF5
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008B0E29
                            • GetLengthSid.ADVAPI32(?), ref: 008B0E40
                            • GetAce.ADVAPI32(?,00000000,?), ref: 008B0E7A
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008B0E96
                            • GetLengthSid.ADVAPI32(?), ref: 008B0EAD
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008B0EB5
                            • HeapAlloc.KERNEL32(00000000), ref: 008B0EBC
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008B0EDD
                            • CopySid.ADVAPI32(00000000), ref: 008B0EE4
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008B0F13
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008B0F35
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008B0F47
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0F6E
                            • HeapFree.KERNEL32(00000000), ref: 008B0F75
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0F7E
                            • HeapFree.KERNEL32(00000000), ref: 008B0F85
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B0F8E
                            • HeapFree.KERNEL32(00000000), ref: 008B0F95
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 008B0FA1
                            • HeapFree.KERNEL32(00000000), ref: 008B0FA8
                              • Part of subcall function 008B1193: GetProcessHeap.KERNEL32(00000008,008B0BB1,?,00000000,?,008B0BB1,?), ref: 008B11A1
                              • Part of subcall function 008B1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,008B0BB1,?), ref: 008B11A8
                              • Part of subcall function 008B1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008B0BB1,?), ref: 008B11B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: e451028cc8da64b00643ca86e551dda27e5b5d355771d87260a327bcd6774598
                            • Instruction ID: 598fb187e7f9448076243e352fffc7e2172c773bed2494fdd2f228e0c037e5fb
                            • Opcode Fuzzy Hash: e451028cc8da64b00643ca86e551dda27e5b5d355771d87260a327bcd6774598
                            • Instruction Fuzzy Hash: 4B713D71A0024AABDF209FA4DC45BEFBBB8FF05310F148155F959EA291DB719A05CF60
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DC4BD
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,008ECC08,00000000,?,00000000,?,?), ref: 008DC544
                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 008DC5A4
                            • _wcslen.LIBCMT ref: 008DC5F4
                            • _wcslen.LIBCMT ref: 008DC66F
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 008DC6B2
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 008DC7C1
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 008DC84D
                            • RegCloseKey.ADVAPI32(?), ref: 008DC881
                            • RegCloseKey.ADVAPI32(00000000), ref: 008DC88E
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 008DC960
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 9721498-966354055
                            • Opcode ID: 469b317963091987ff067b33779cbc0a3a957058384e955e4de690dcb4d8773c
                            • Instruction ID: cc21ae72dc99ba3a16ac69ed504675f88e69db3dd2681c962f72c1c61003a425
                            • Opcode Fuzzy Hash: 469b317963091987ff067b33779cbc0a3a957058384e955e4de690dcb4d8773c
                            • Instruction Fuzzy Hash: 711245356042019FDB14DF18D881A2AB7E5FF88765F04895DF88ADB3A2DB31ED45CB82
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 008E09C6
                            • _wcslen.LIBCMT ref: 008E0A01
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008E0A54
                            • _wcslen.LIBCMT ref: 008E0A8A
                            • _wcslen.LIBCMT ref: 008E0B06
                            • _wcslen.LIBCMT ref: 008E0B81
                              • Part of subcall function 0086F9F2: _wcslen.LIBCMT ref: 0086F9FD
                              • Part of subcall function 008B2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008B2BFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$MessageSend$BuffCharUpper
                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                            • API String ID: 1103490817-4258414348
                            • Opcode ID: 73d1ed363788ab5f9c3941fada91687d37c3b0ff1082db4c6c6ab9d921697ed3
                            • Instruction ID: d41e2aa687df82a16134b2b5d434c4d41360a0066a50bbe925a7a630cd8d9244
                            • Opcode Fuzzy Hash: 73d1ed363788ab5f9c3941fada91687d37c3b0ff1082db4c6c6ab9d921697ed3
                            • Instruction Fuzzy Hash: 3DE18A352083858FC714DF29C45096AB7E1FF9A358B14895CF896DB3A2D770ED89CB82
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                            • API String ID: 1256254125-909552448
                            • Opcode ID: a3df0efdc313a69acf351a6adb7e071230fc18577c4c64d7d8b7950c9f0d64da
                            • Instruction ID: 5f3e576c7c64008a3dca4a7fc060ac7b2d29a142be3471919db47dca78109d9a
                            • Opcode Fuzzy Hash: a3df0efdc313a69acf351a6adb7e071230fc18577c4c64d7d8b7950c9f0d64da
                            • Instruction Fuzzy Hash: 9D71F27261012B8BCB20DE6CC9416BA77A1FB61764F11072BF856DB384EA31CD85C3A1
                            APIs
                            • _wcslen.LIBCMT ref: 008E835A
                            • _wcslen.LIBCMT ref: 008E836E
                            • _wcslen.LIBCMT ref: 008E8391
                            • _wcslen.LIBCMT ref: 008E83B4
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008E83F2
                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,008E5BF2), ref: 008E844E
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008E8487
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008E84CA
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008E8501
                            • FreeLibrary.KERNEL32(?), ref: 008E850D
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 008E851D
                            • DestroyIcon.USER32(?,?,?,?,?,008E5BF2), ref: 008E852C
                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 008E8549
                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 008E8555
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                            • String ID: .dll$.exe$.icl
                            • API String ID: 799131459-1154884017
                            • Opcode ID: 6a5aa2932eab2112676b8812c29364c1e90177323830f0124b0f9b3fa3d6c896
                            • Instruction ID: ef616086aa34d976e8d7f96ec9d6c92ad48e4bfd60e3becc03549dfabe4158ff
                            • Opcode Fuzzy Hash: 6a5aa2932eab2112676b8812c29364c1e90177323830f0124b0f9b3fa3d6c896
                            • Instruction Fuzzy Hash: 9561CF71940259FAEB14DF65CC81BBE77A8FB05711F108509F919DA1D1DF74E980CBA0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                            • API String ID: 0-1645009161
                            • Opcode ID: 32c1513f74ecc35d2385ad3a17508ddf999f7359f6ea9b18147aec614ec5d336
                            • Instruction ID: d941fa11773a972bffe78060c132aa2dcafb9f4ef5ab8b40d53f53ae3beece41
                            • Opcode Fuzzy Hash: 32c1513f74ecc35d2385ad3a17508ddf999f7359f6ea9b18147aec614ec5d336
                            • Instruction Fuzzy Hash: 8881F771A44205BBDF21AF64EC42FAE37A8FF15301F148024FD14EA296EB70DA05C792
                            APIs
                            • LoadIconW.USER32(00000063), ref: 008B5A2E
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 008B5A40
                            • SetWindowTextW.USER32(?,?), ref: 008B5A57
                            • GetDlgItem.USER32(?,000003EA), ref: 008B5A6C
                            • SetWindowTextW.USER32(00000000,?), ref: 008B5A72
                            • GetDlgItem.USER32(?,000003E9), ref: 008B5A82
                            • SetWindowTextW.USER32(00000000,?), ref: 008B5A88
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 008B5AA9
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 008B5AC3
                            • GetWindowRect.USER32(?,?), ref: 008B5ACC
                            • _wcslen.LIBCMT ref: 008B5B33
                            • SetWindowTextW.USER32(?,?), ref: 008B5B6F
                            • GetDesktopWindow.USER32 ref: 008B5B75
                            • GetWindowRect.USER32(00000000), ref: 008B5B7C
                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 008B5BD3
                            • GetClientRect.USER32(?,?), ref: 008B5BE0
                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 008B5C05
                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 008B5C2F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                            • String ID:
                            • API String ID: 895679908-0
                            • Opcode ID: 0ba973e9f402f24c631cd28353a5fdcd81979017beca4e6ae4b82e32a5fe9a9f
                            • Instruction ID: 82e8afe7e0e45a559e4d7be423e8ad0f645de65e02c78634b6fe4063a7a928d7
                            • Opcode Fuzzy Hash: 0ba973e9f402f24c631cd28353a5fdcd81979017beca4e6ae4b82e32a5fe9a9f
                            • Instruction Fuzzy Hash: 4E716B31900B09AFDB20DFA8CE85BAEBBF5FF48714F104918E582E66A0D775E945CB50
                            APIs
                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 008700C6
                              • Part of subcall function 008700ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0092070C,00000FA0,E580436A,?,?,?,?,008923B3,000000FF), ref: 0087011C
                              • Part of subcall function 008700ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,008923B3,000000FF), ref: 00870127
                              • Part of subcall function 008700ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,008923B3,000000FF), ref: 00870138
                              • Part of subcall function 008700ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0087014E
                              • Part of subcall function 008700ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0087015C
                              • Part of subcall function 008700ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0087016A
                              • Part of subcall function 008700ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00870195
                              • Part of subcall function 008700ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008701A0
                            • ___scrt_fastfail.LIBCMT ref: 008700E7
                              • Part of subcall function 008700A3: __onexit.LIBCMT ref: 008700A9
                            Strings
                            • WakeAllConditionVariable, xrefs: 00870162
                            • kernel32.dll, xrefs: 00870133
                            • InitializeConditionVariable, xrefs: 00870148
                            • SleepConditionVariableCS, xrefs: 00870154
                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00870122
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                            • API String ID: 66158676-1714406822
                            • Opcode ID: abd833f62d7325f661c57f75f84d44fcf0a738b4c3640f89041f3193ede5c43d
                            • Instruction ID: f8e9168bb5b1283428077473bd9439f033e5dee434201a5307e5e421cd643974
                            • Opcode Fuzzy Hash: abd833f62d7325f661c57f75f84d44fcf0a738b4c3640f89041f3193ede5c43d
                            • Instruction Fuzzy Hash: 0B213B32A49750EFD7206B68BC45B2A3798FB45B60F008139F919DB396DB74DC008FA1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 176396367-1603158881
                            • Opcode ID: ca4a73e0322a087246faa9a07c73d851f5c7089179172a3a361ad1c02ec57fd8
                            • Instruction ID: 4e864961780e6452df4e2cc7563ef8e36f059d0550221ca8e9325cf1824a6aea
                            • Opcode Fuzzy Hash: ca4a73e0322a087246faa9a07c73d851f5c7089179172a3a361ad1c02ec57fd8
                            • Instruction Fuzzy Hash: 2FE1C532A0061AEBCB289F78C8517EEBBB4FF54714F558129E456F7350DB30AE898790
                            APIs
                            • CharLowerBuffW.USER32(00000000,00000000,008ECC08), ref: 008C4527
                            • _wcslen.LIBCMT ref: 008C453B
                            • _wcslen.LIBCMT ref: 008C4599
                            • _wcslen.LIBCMT ref: 008C45F4
                            • _wcslen.LIBCMT ref: 008C463F
                            • _wcslen.LIBCMT ref: 008C46A7
                              • Part of subcall function 0086F9F2: _wcslen.LIBCMT ref: 0086F9FD
                            • GetDriveTypeW.KERNEL32(?,00916BF0,00000061), ref: 008C4743
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharDriveLowerType
                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 2055661098-1000479233
                            • Opcode ID: 47a513bb51a877e7770d306d4cca09ca3d98ca4c9c7c1a881d67a78791567615
                            • Instruction ID: 3c781cb4c855a3e2a0394afe4e9db145c4e773effca223c36f51b7483e1006b2
                            • Opcode Fuzzy Hash: 47a513bb51a877e7770d306d4cca09ca3d98ca4c9c7c1a881d67a78791567615
                            • Instruction Fuzzy Hash: 6AB1DE31A083029BC720DF28D8A0F6AB7F5FFA5764F50592DF596C7295E730D888CA52
                            APIs
                            • _wcslen.LIBCMT ref: 008DB198
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008DB1B0
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008DB1D4
                            • _wcslen.LIBCMT ref: 008DB200
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008DB214
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008DB236
                            • _wcslen.LIBCMT ref: 008DB332
                              • Part of subcall function 008C05A7: GetStdHandle.KERNEL32(000000F6), ref: 008C05C6
                            • _wcslen.LIBCMT ref: 008DB34B
                            • _wcslen.LIBCMT ref: 008DB366
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008DB3B6
                            • GetLastError.KERNEL32(00000000), ref: 008DB407
                            • CloseHandle.KERNEL32(?), ref: 008DB439
                            • CloseHandle.KERNEL32(00000000), ref: 008DB44A
                            • CloseHandle.KERNEL32(00000000), ref: 008DB45C
                            • CloseHandle.KERNEL32(00000000), ref: 008DB46E
                            • CloseHandle.KERNEL32(?), ref: 008DB4E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                            • String ID:
                            • API String ID: 2178637699-0
                            • Opcode ID: 458be6f243156c445121a9ee84a197c07e912e2fda4ac4fd4c6d180974cb53d8
                            • Instruction ID: 9ab1983a4b2b1fdab8576b33b20e2a9ac5d63eefb6f607e88e139af4a2e0680e
                            • Opcode Fuzzy Hash: 458be6f243156c445121a9ee84a197c07e912e2fda4ac4fd4c6d180974cb53d8
                            • Instruction Fuzzy Hash: 53F15731508240DFCB14EF28C891A6ABBE5FF85314F15865EF8999B3A2DB31EC45CB52
                            APIs
                            • GetMenuItemCount.USER32(00921990), ref: 00892F8D
                            • GetMenuItemCount.USER32(00921990), ref: 0089303D
                            • GetCursorPos.USER32(?), ref: 00893081
                            • SetForegroundWindow.USER32(00000000), ref: 0089308A
                            • TrackPopupMenuEx.USER32(00921990,00000000,?,00000000,00000000,00000000), ref: 0089309D
                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 008930A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                            • String ID: 0
                            • API String ID: 36266755-4108050209
                            • Opcode ID: e56bcb6888896f6d531982ffcbe9b43a4daabe02757d89e8a8ee2267ea720ac2
                            • Instruction ID: cf89626bebc8f6b1370846df8d7640e0155390c45b00cc6fb653555fc488e413
                            • Opcode Fuzzy Hash: e56bcb6888896f6d531982ffcbe9b43a4daabe02757d89e8a8ee2267ea720ac2
                            • Instruction Fuzzy Hash: BB712930640609BEEF319F68CC89FAABF64FF05364F244216F925EA1E0C7B1A914DB51
                            APIs
                            • DestroyWindow.USER32(?,?), ref: 008E6DEB
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 008E6E5F
                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 008E6E81
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E6E94
                            • DestroyWindow.USER32(?), ref: 008E6EB5
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00850000,00000000), ref: 008E6EE4
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008E6EFD
                            • GetDesktopWindow.USER32 ref: 008E6F16
                            • GetWindowRect.USER32(00000000), ref: 008E6F1D
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008E6F35
                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 008E6F4D
                              • Part of subcall function 00869944: GetWindowLongW.USER32(?,000000EB), ref: 00869952
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                            • String ID: 0$tooltips_class32
                            • API String ID: 2429346358-3619404913
                            • Opcode ID: e468a7fc2a8081b1e6c2e65aab10d1967b33032f2b791ef555f7cf923bc83b52
                            • Instruction ID: 43353ea9b0e2a2a3a144c89e8a2ace715df5d40ae937f59cadc2855dc762471d
                            • Opcode Fuzzy Hash: e468a7fc2a8081b1e6c2e65aab10d1967b33032f2b791ef555f7cf923bc83b52
                            • Instruction Fuzzy Hash: 2A71AC74504285AFDB20CF19DC84A6BBBE9FBAA344F14041DF988C72A1DB30EC56DB12
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • DragQueryPoint.SHELL32(?,?), ref: 008E9147
                              • Part of subcall function 008E7674: ClientToScreen.USER32(?,?), ref: 008E769A
                              • Part of subcall function 008E7674: GetWindowRect.USER32(?,?), ref: 008E7710
                              • Part of subcall function 008E7674: PtInRect.USER32(?,?,008E8B89), ref: 008E7720
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 008E91B0
                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008E91BB
                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008E91DE
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 008E9225
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 008E923E
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 008E9255
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 008E9277
                            • DragFinish.SHELL32(?), ref: 008E927E
                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 008E9371
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                            • API String ID: 221274066-3440237614
                            • Opcode ID: e550a6fe5cc45c4cbfe0f53faa76f8dfd44445b10328839e886c154eee35b221
                            • Instruction ID: 4afd798c3582b74afea0e8532fcb4e459728a39f422ddfc85d56df801b378b3a
                            • Opcode Fuzzy Hash: e550a6fe5cc45c4cbfe0f53faa76f8dfd44445b10328839e886c154eee35b221
                            • Instruction Fuzzy Hash: 68619971108341AFC701DF68DC85DAFBBE8FF99750F00092EF9A5962A1DB709A49CB52
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008CC4B0
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008CC4C3
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008CC4D7
                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 008CC4F0
                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 008CC533
                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 008CC549
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008CC554
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008CC584
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008CC5DC
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008CC5F0
                            • InternetCloseHandle.WININET(00000000), ref: 008CC5FB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                            • String ID:
                            • API String ID: 3800310941-3916222277
                            • Opcode ID: deca39a5984d874cfd4f99282ed37ea461baeec34bfaa490e46755623dc34ec2
                            • Instruction ID: d85cf8e5236510ff912151c14330e748b15d595018835d5660e3ed7354198d5d
                            • Opcode Fuzzy Hash: deca39a5984d874cfd4f99282ed37ea461baeec34bfaa490e46755623dc34ec2
                            • Instruction Fuzzy Hash: 055139B1900648BFDB219F64CD88FAB7BBCFB08754F00841EF94AD6250DB34E9459B61
                            APIs
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 008E8592
                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85A2
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85AD
                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85BA
                            • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85C8
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85D7
                            • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85E0
                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85E7
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008E85F8
                            • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,008EFC38,?), ref: 008E8611
                            • GlobalFree.KERNEL32(00000000), ref: 008E8621
                            • GetObjectW.GDI32(?,00000018,?), ref: 008E8641
                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 008E8671
                            • DeleteObject.GDI32(?), ref: 008E8699
                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008E86AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                            • String ID:
                            • API String ID: 3840717409-0
                            • Opcode ID: e16d56f3424dc1070bd7bd506401a4b477b4f2714e9b4cf7d62c66a6e1bc28d3
                            • Instruction ID: 7eab7b26d2bbcfadb1eab0c9655db2d0c4fdd9095ef01eeb4f5ca52a28cadbaa
                            • Opcode Fuzzy Hash: e16d56f3424dc1070bd7bd506401a4b477b4f2714e9b4cf7d62c66a6e1bc28d3
                            • Instruction Fuzzy Hash: E641EB75A00244FFDB119FA5DC88EAE7BB8FB99715F104058F919EB260DB309901DB60
                            APIs
                            • VariantInit.OLEAUT32(00000000), ref: 008C1502
                            • VariantCopy.OLEAUT32(?,?), ref: 008C150B
                            • VariantClear.OLEAUT32(?), ref: 008C1517
                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008C15FB
                            • VarR8FromDec.OLEAUT32(?,?), ref: 008C1657
                            • VariantInit.OLEAUT32(?), ref: 008C1708
                            • SysFreeString.OLEAUT32(?), ref: 008C178C
                            • VariantClear.OLEAUT32(?), ref: 008C17D8
                            • VariantClear.OLEAUT32(?), ref: 008C17E7
                            • VariantInit.OLEAUT32(00000000), ref: 008C1823
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                            • API String ID: 1234038744-3931177956
                            • Opcode ID: 2ed676895917cc4617accd59bd6cc409a2c597762f167d3708e4510617982fed
                            • Instruction ID: c7b56cfa12a9448f97c13c4c488f10701f9f4a14e8fabf724da9b10b88457fd3
                            • Opcode Fuzzy Hash: 2ed676895917cc4617accd59bd6cc409a2c597762f167d3708e4510617982fed
                            • Instruction Fuzzy Hash: DFD1CD71A00219DBDF009F69E8C9F69B7B5FF46704F50809AE846EB182DB30EC45DB62
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DB6AE,?,?), ref: 008DC9B5
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DC9F1
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA68
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DB6F4
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008DB772
                            • RegDeleteValueW.ADVAPI32(?,?), ref: 008DB80A
                            • RegCloseKey.ADVAPI32(?), ref: 008DB87E
                            • RegCloseKey.ADVAPI32(?), ref: 008DB89C
                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 008DB8F2
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008DB904
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 008DB922
                            • FreeLibrary.KERNEL32(00000000), ref: 008DB983
                            • RegCloseKey.ADVAPI32(00000000), ref: 008DB994
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 146587525-4033151799
                            • Opcode ID: 66c7038615848a5a8caa923947e6a653946acf44ecb9ae33687692cd75383b9f
                            • Instruction ID: 7dac8f7d2e12b30c04d7d64dcba7560941db38ee896bd5d59c212f7dda164cd7
                            • Opcode Fuzzy Hash: 66c7038615848a5a8caa923947e6a653946acf44ecb9ae33687692cd75383b9f
                            • Instruction Fuzzy Hash: CEC17B34204241EFD714DF18C494F2ABBE5FF84318F55865DE49A8B3A2DB71E845CB92
                            APIs
                            • GetDC.USER32(00000000), ref: 008D25D8
                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008D25E8
                            • CreateCompatibleDC.GDI32(?), ref: 008D25F4
                            • SelectObject.GDI32(00000000,?), ref: 008D2601
                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 008D266D
                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008D26AC
                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008D26D0
                            • SelectObject.GDI32(?,?), ref: 008D26D8
                            • DeleteObject.GDI32(?), ref: 008D26E1
                            • DeleteDC.GDI32(?), ref: 008D26E8
                            • ReleaseDC.USER32(00000000,?), ref: 008D26F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                            • String ID: (
                            • API String ID: 2598888154-3887548279
                            • Opcode ID: a2a1618ae43852bd9f9e473dfef4906401aa0c37d3877364e762f90e67d27c6d
                            • Instruction ID: b0bddceb84fba5595cd738faea469b704a1931bdaae49c14f63c909ec95fa398
                            • Opcode Fuzzy Hash: a2a1618ae43852bd9f9e473dfef4906401aa0c37d3877364e762f90e67d27c6d
                            • Instruction Fuzzy Hash: A461D175D00219EFCF14CFA8D884EAEBBB5FF58310F20852AE955AB250E770A9518F60
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 0088DAA1
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D659
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D66B
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D67D
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D68F
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6A1
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6B3
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6C5
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6D7
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6E9
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D6FB
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D70D
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D71F
                              • Part of subcall function 0088D63C: _free.LIBCMT ref: 0088D731
                            • _free.LIBCMT ref: 0088DA96
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 0088DAB8
                            • _free.LIBCMT ref: 0088DACD
                            • _free.LIBCMT ref: 0088DAD8
                            • _free.LIBCMT ref: 0088DAFA
                            • _free.LIBCMT ref: 0088DB0D
                            • _free.LIBCMT ref: 0088DB1B
                            • _free.LIBCMT ref: 0088DB26
                            • _free.LIBCMT ref: 0088DB5E
                            • _free.LIBCMT ref: 0088DB65
                            • _free.LIBCMT ref: 0088DB82
                            • _free.LIBCMT ref: 0088DB9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID:
                            • API String ID: 161543041-0
                            • Opcode ID: 7eca3f07c264824bc1c19b8b256f59abaab8b3d367e48cc767bc4029346566e6
                            • Instruction ID: d3bcf750fd3667edfbc9890db6e9c5f6ceb5358ee2884acce63fbbcca4f5f689
                            • Opcode Fuzzy Hash: 7eca3f07c264824bc1c19b8b256f59abaab8b3d367e48cc767bc4029346566e6
                            • Instruction Fuzzy Hash: AA3147326443059FEB26BA39EC45F5ABBE9FF00360F264429E449D71D2DE35EC808B21
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 008B369C
                            • _wcslen.LIBCMT ref: 008B36A7
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 008B3797
                            • GetClassNameW.USER32(?,?,00000400), ref: 008B380C
                            • GetDlgCtrlID.USER32(?), ref: 008B385D
                            • GetWindowRect.USER32(?,?), ref: 008B3882
                            • GetParent.USER32(?), ref: 008B38A0
                            • ScreenToClient.USER32(00000000), ref: 008B38A7
                            • GetClassNameW.USER32(?,?,00000100), ref: 008B3921
                            • GetWindowTextW.USER32(?,?,00000400), ref: 008B395D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                            • String ID: %s%u
                            • API String ID: 4010501982-679674701
                            • Opcode ID: ed9e66f6cb2c73f56e36bed0e12a26b9411f308055ceb72979261644c66d9dd9
                            • Instruction ID: c541a744df007549bd8159aed699a36d37a03d97d0776a0f3282335847d7610b
                            • Opcode Fuzzy Hash: ed9e66f6cb2c73f56e36bed0e12a26b9411f308055ceb72979261644c66d9dd9
                            • Instruction Fuzzy Hash: DA91C371204706AFD719DF24C885FEAFBA8FF45350F008529F999C6290EB30EA45CB92
                            APIs
                            • GetClassNameW.USER32(?,?,00000400), ref: 008B4994
                            • GetWindowTextW.USER32(?,?,00000400), ref: 008B49DA
                            • _wcslen.LIBCMT ref: 008B49EB
                            • CharUpperBuffW.USER32(?,00000000), ref: 008B49F7
                            • _wcsstr.LIBVCRUNTIME ref: 008B4A2C
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 008B4A64
                            • GetWindowTextW.USER32(?,?,00000400), ref: 008B4A9D
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 008B4AE6
                            • GetClassNameW.USER32(?,?,00000400), ref: 008B4B20
                            • GetWindowRect.USER32(?,?), ref: 008B4B8B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                            • String ID: ThumbnailClass
                            • API String ID: 1311036022-1241985126
                            • Opcode ID: f9d4742ff11b85366434e58512feb48d2c24ea17c9affd01b4166464e65ab052
                            • Instruction ID: bd91bb3612ecf9fe0f0cb49aa5d13d5a5e91aa654aef7647158eed91a8ff8cc7
                            • Opcode Fuzzy Hash: f9d4742ff11b85366434e58512feb48d2c24ea17c9affd01b4166464e65ab052
                            • Instruction Fuzzy Hash: D091AE711042059BDB04DF54C982BEA7BA8FF84714F049469FE89DA2A7DB30ED45CBA2
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008E8D5A
                            • GetFocus.USER32 ref: 008E8D6A
                            • GetDlgCtrlID.USER32(00000000), ref: 008E8D75
                            • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 008E8E1D
                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 008E8ECF
                            • GetMenuItemCount.USER32(?), ref: 008E8EEC
                            • GetMenuItemID.USER32(?,00000000), ref: 008E8EFC
                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 008E8F2E
                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 008E8F70
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008E8FA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                            • String ID: 0
                            • API String ID: 1026556194-4108050209
                            • Opcode ID: bc07785640e89dbf56414afc58be229e614aba2ddb64d9c793fc3009fc9de89e
                            • Instruction ID: 74eff4b9ba1fd13529ab7a486cc96ec1c4733ff67f1578134f045e7960a04fdb
                            • Opcode Fuzzy Hash: bc07785640e89dbf56414afc58be229e614aba2ddb64d9c793fc3009fc9de89e
                            • Instruction Fuzzy Hash: 9981AE71908381DFDB10CF25D884AAF7BE9FB8A714F040959F999D7291DB30D901CBA2
                            APIs
                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 008BDC20
                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 008BDC46
                            • _wcslen.LIBCMT ref: 008BDC50
                            • _wcsstr.LIBVCRUNTIME ref: 008BDCA0
                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 008BDCBC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                            • API String ID: 1939486746-1459072770
                            • Opcode ID: 574a8d19dbe43c9156bec59501a17e06b559da86c9674811839f7925e78be9b4
                            • Instruction ID: 24be9206d2ac2787b25d5dd60e88b1c2de3bec08e9fc55ec0f7757680d20c904
                            • Opcode Fuzzy Hash: 574a8d19dbe43c9156bec59501a17e06b559da86c9674811839f7925e78be9b4
                            • Instruction Fuzzy Hash: 8541F332A403047BDB10A7699C47EFF7B6CFF42750F144069FA08E6293FB65D90296A6
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008DCC64
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 008DCC8D
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008DCD48
                              • Part of subcall function 008DCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 008DCCAA
                              • Part of subcall function 008DCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 008DCCBD
                              • Part of subcall function 008DCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008DCCCF
                              • Part of subcall function 008DCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008DCD05
                              • Part of subcall function 008DCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008DCD28
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 008DCCF3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2734957052-4033151799
                            • Opcode ID: 12e197b2a8175fd8dd491e379cb924f764c3633c2773fd319f1dae5a7a9d266d
                            • Instruction ID: 9d50504126de3a6af7094f9f65c6d281b1252645b7a701b13bd34e23c21e1559
                            • Opcode Fuzzy Hash: 12e197b2a8175fd8dd491e379cb924f764c3633c2773fd319f1dae5a7a9d266d
                            • Instruction Fuzzy Hash: BB316E71D0112ABBDB208B94DC88EFFBB7CFF45754F000266F905E6240DA349A46DAA0
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 008C3D40
                            • _wcslen.LIBCMT ref: 008C3D6D
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 008C3D9D
                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 008C3DBE
                            • RemoveDirectoryW.KERNEL32(?), ref: 008C3DCE
                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 008C3E55
                            • CloseHandle.KERNEL32(00000000), ref: 008C3E60
                            • CloseHandle.KERNEL32(00000000), ref: 008C3E6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                            • String ID: :$\$\??\%s
                            • API String ID: 1149970189-3457252023
                            • Opcode ID: fba9d26e22d114558c5032184db2231aaa6d6bd6044b8976188e7ba16de20c74
                            • Instruction ID: e8192c8ba0034345ef1564c9062d73ae1404ea1495e291962d9f784d3d2e9b60
                            • Opcode Fuzzy Hash: fba9d26e22d114558c5032184db2231aaa6d6bd6044b8976188e7ba16de20c74
                            • Instruction Fuzzy Hash: EC31A371A00249ABDB209BA4DC89FEF37BCFF89700F1081A9F619D6160EB70D7458B24
                            APIs
                            • timeGetTime.WINMM ref: 008BE6B4
                              • Part of subcall function 0086E551: timeGetTime.WINMM(?,?,008BE6D4), ref: 0086E555
                            • Sleep.KERNEL32(0000000A), ref: 008BE6E1
                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 008BE705
                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 008BE727
                            • SetActiveWindow.USER32 ref: 008BE746
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 008BE754
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 008BE773
                            • Sleep.KERNEL32(000000FA), ref: 008BE77E
                            • IsWindow.USER32 ref: 008BE78A
                            • EndDialog.USER32(00000000), ref: 008BE79B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                            • String ID: BUTTON
                            • API String ID: 1194449130-3405671355
                            • Opcode ID: 90c0cd760a32ccbbbef8f323b3fc7e460a4cd0d478ee7080ad70b27287969813
                            • Instruction ID: 547f38462d35bf80c70c1ef384057663b6e06a5e1961619724dd76573441c913
                            • Opcode Fuzzy Hash: 90c0cd760a32ccbbbef8f323b3fc7e460a4cd0d478ee7080ad70b27287969813
                            • Instruction Fuzzy Hash: 2621E771614288BFEB205F24ECC9EAA3B69FB65348F101425F811D53B1DF71AC02EB25
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 008BEA5D
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 008BEA73
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008BEA84
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 008BEA96
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 008BEAA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: SendString$_wcslen
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 2420728520-1007645807
                            • Opcode ID: 4b4182f4ed170470b4fc283686e263014235cef66b534922c880430b590c95e1
                            • Instruction ID: 508c50d95e471a964f52f6b7afc3c697be1167c60060ca4079d597dd07fd38c9
                            • Opcode Fuzzy Hash: 4b4182f4ed170470b4fc283686e263014235cef66b534922c880430b590c95e1
                            • Instruction Fuzzy Hash: BC114C21A9026D7ED720A7A9DC4ADFB6A7CFBD1B44F401429B811E21D1EEB01A89C5B1
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 008B5CE2
                            • GetWindowRect.USER32(00000000,?), ref: 008B5CFB
                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 008B5D59
                            • GetDlgItem.USER32(?,00000002), ref: 008B5D69
                            • GetWindowRect.USER32(00000000,?), ref: 008B5D7B
                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 008B5DCF
                            • GetDlgItem.USER32(?,000003E9), ref: 008B5DDD
                            • GetWindowRect.USER32(00000000,?), ref: 008B5DEF
                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 008B5E31
                            • GetDlgItem.USER32(?,000003EA), ref: 008B5E44
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 008B5E5A
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 008B5E67
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: 3855971d6bc574e5018d1a163945a5f0722ef2c95234ede6fb9e8f6557157f19
                            • Instruction ID: 52421d5b2ee5b768bacd1aace6344ec381d02d44be28fc780bc75529da3e1cc5
                            • Opcode Fuzzy Hash: 3855971d6bc574e5018d1a163945a5f0722ef2c95234ede6fb9e8f6557157f19
                            • Instruction Fuzzy Hash: CA51FD71E00609AFDF18CF68DD89AAEBBB5FB58300F548229F915E6290D770AE05CB50
                            APIs
                              • Part of subcall function 00868F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00868BE8,?,00000000,?,?,?,?,00868BBA,00000000,?), ref: 00868FC5
                            • DestroyWindow.USER32(?), ref: 00868C81
                            • KillTimer.USER32(00000000,?,?,?,?,00868BBA,00000000,?), ref: 00868D1B
                            • DestroyAcceleratorTable.USER32(00000000), ref: 008A6973
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00868BBA,00000000,?), ref: 008A69A1
                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00868BBA,00000000,?), ref: 008A69B8
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00868BBA,00000000), ref: 008A69D4
                            • DeleteObject.GDI32(00000000), ref: 008A69E6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                            • String ID:
                            • API String ID: 641708696-0
                            • Opcode ID: e525cfb3398f7e7116f79b2443716e23803bd91343e51fdfbc0f4e4b91d2a89c
                            • Instruction ID: f269efcc3268d62c7210206b6a246be388a9492bb67abfc5fde73bd07fa1cc05
                            • Opcode Fuzzy Hash: e525cfb3398f7e7116f79b2443716e23803bd91343e51fdfbc0f4e4b91d2a89c
                            • Instruction Fuzzy Hash: 6961DA30402704DFDB369F28D998B267BF1FB61316F194618E046DB960CB31A8E2DF91
                            APIs
                              • Part of subcall function 00869944: GetWindowLongW.USER32(?,000000EB), ref: 00869952
                            • GetSysColor.USER32(0000000F), ref: 00869862
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ColorLongWindow
                            • String ID:
                            • API String ID: 259745315-0
                            • Opcode ID: c2986909ce0b950910548aa9fc9b6ab4fba62de40e043efbc65e7123e785554c
                            • Instruction ID: 88cbe364f6ade16f933bbe344df13a16750a9f72fe465071022e0c1e0cd3598b
                            • Opcode Fuzzy Hash: c2986909ce0b950910548aa9fc9b6ab4fba62de40e043efbc65e7123e785554c
                            • Instruction Fuzzy Hash: 89417C31504644EFDB205F389C88BBA3BA9FB46361F154669F9E2CB1E1D7319C42DB11
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0089F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 008B9717
                            • LoadStringW.USER32(00000000,?,0089F7F8,00000001), ref: 008B9720
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0089F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 008B9742
                            • LoadStringW.USER32(00000000,?,0089F7F8,00000001), ref: 008B9745
                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 008B9866
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wcslen
                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                            • API String ID: 747408836-2268648507
                            • Opcode ID: 4c4f98a545407837394ea3f051438c206d7ff6e2b2247ba777b1b2dc8665ded6
                            • Instruction ID: b6e1ed3238f8ce19866f5f0ef19683e37dcb53f2c388d23b3262ceaadb51897f
                            • Opcode Fuzzy Hash: 4c4f98a545407837394ea3f051438c206d7ff6e2b2247ba777b1b2dc8665ded6
                            • Instruction Fuzzy Hash: 71415A7290021DAACF04EBE8DD86DEEB778FF55341F500065FA05B2192EA356F49CB62
                            APIs
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008B07A2
                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008B07BE
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008B07DA
                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 008B0804
                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 008B082C
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008B0837
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008B083C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                            • API String ID: 323675364-22481851
                            • Opcode ID: 88bff457a297e45a7e2cf210e0ce9a06042ec7f5574c16e8f41b6233470af3d5
                            • Instruction ID: a04a155ba5c08795786e071500929fa3b271ab8ed490aac006bcb717df14f1d5
                            • Opcode Fuzzy Hash: 88bff457a297e45a7e2cf210e0ce9a06042ec7f5574c16e8f41b6233470af3d5
                            • Instruction Fuzzy Hash: 4C410672C1022DEBCF15EBA4DC958EEB778FF44351B454129E811A7261EB309E48CF91
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 008D3C5C
                            • CoInitialize.OLE32(00000000), ref: 008D3C8A
                            • CoUninitialize.OLE32 ref: 008D3C94
                            • _wcslen.LIBCMT ref: 008D3D2D
                            • GetRunningObjectTable.OLE32(00000000,?), ref: 008D3DB1
                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 008D3ED5
                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 008D3F0E
                            • CoGetObject.OLE32(?,00000000,008EFB98,?), ref: 008D3F2D
                            • SetErrorMode.KERNEL32(00000000), ref: 008D3F40
                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 008D3FC4
                            • VariantClear.OLEAUT32(?), ref: 008D3FD8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                            • String ID:
                            • API String ID: 429561992-0
                            • Opcode ID: bff8a6d75fa6e3c9471356fff647c8c761eec01fc8db62e359600b7f7778fb98
                            • Instruction ID: a0b549052bbccab30c8549300b59560535e5e2fdd95d7fdcd71df4d14d054310
                            • Opcode Fuzzy Hash: bff8a6d75fa6e3c9471356fff647c8c761eec01fc8db62e359600b7f7778fb98
                            • Instruction Fuzzy Hash: B5C104716082059FD700DF68C88492BB7E9FF89748F144A1EF98ADB251DB31EE05CB52
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 008C7AF3
                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 008C7B8F
                            • SHGetDesktopFolder.SHELL32(?), ref: 008C7BA3
                            • CoCreateInstance.OLE32(008EFD08,00000000,00000001,00916E6C,?), ref: 008C7BEF
                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 008C7C74
                            • CoTaskMemFree.OLE32(?,?), ref: 008C7CCC
                            • SHBrowseForFolderW.SHELL32(?), ref: 008C7D57
                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 008C7D7A
                            • CoTaskMemFree.OLE32(00000000), ref: 008C7D81
                            • CoTaskMemFree.OLE32(00000000), ref: 008C7DD6
                            • CoUninitialize.OLE32 ref: 008C7DDC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                            • String ID:
                            • API String ID: 2762341140-0
                            • Opcode ID: 01ea8803dca0c0b4a5fcdbe107f807e628f087f12c025d2f1b2345f7c9f5d3a6
                            • Instruction ID: b9006390a89bfb45ce65bd45e60b9099861f4ad8c0f76adaf4ce36bf19ac2d98
                            • Opcode Fuzzy Hash: 01ea8803dca0c0b4a5fcdbe107f807e628f087f12c025d2f1b2345f7c9f5d3a6
                            • Instruction Fuzzy Hash: 97C1FA75A04119AFCB14DFA8C884DAEBBF9FF48314B1484A9E91ADB261D730ED45CF90
                            APIs
                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 008E5504
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008E5515
                            • CharNextW.USER32(00000158), ref: 008E5544
                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 008E5585
                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 008E559B
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008E55AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$CharNext
                            • String ID:
                            • API String ID: 1350042424-0
                            • Opcode ID: d0b010eeae76f0ab7c35f421bf7fa43b0994296058eaa614e43fdbf0b7ff3446
                            • Instruction ID: 51f77c7795f9dd2152375f2b2b59efc0448d798f210130acf15c04e6044faccb
                            • Opcode Fuzzy Hash: d0b010eeae76f0ab7c35f421bf7fa43b0994296058eaa614e43fdbf0b7ff3446
                            • Instruction Fuzzy Hash: 3361BF70900689EFDF109F56DC84AFE3BB9FB06328F104149F925EB2A1D7708A81DB61
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 008AFAAF
                            • SafeArrayAllocData.OLEAUT32(?), ref: 008AFB08
                            • VariantInit.OLEAUT32(?), ref: 008AFB1A
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 008AFB3A
                            • VariantCopy.OLEAUT32(?,?), ref: 008AFB8D
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 008AFBA1
                            • VariantClear.OLEAUT32(?), ref: 008AFBB6
                            • SafeArrayDestroyData.OLEAUT32(?), ref: 008AFBC3
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008AFBCC
                            • VariantClear.OLEAUT32(?), ref: 008AFBDE
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008AFBE9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 2745512e174a6573545d1522063443ec927e7241b2b214511f4605510075af10
                            • Instruction ID: f9592a36bb37bee78df47e91322cbc0b1b694d08dce6a5af14d35a4609e49bec
                            • Opcode Fuzzy Hash: 2745512e174a6573545d1522063443ec927e7241b2b214511f4605510075af10
                            • Instruction Fuzzy Hash: 5D415235E002199FDB00DFA8C894DADBBB9FF09354F008065F955EB261DB30A946CFA1
                            APIs
                            • GetKeyboardState.USER32(?), ref: 008B9CA1
                            • GetAsyncKeyState.USER32(000000A0), ref: 008B9D22
                            • GetKeyState.USER32(000000A0), ref: 008B9D3D
                            • GetAsyncKeyState.USER32(000000A1), ref: 008B9D57
                            • GetKeyState.USER32(000000A1), ref: 008B9D6C
                            • GetAsyncKeyState.USER32(00000011), ref: 008B9D84
                            • GetKeyState.USER32(00000011), ref: 008B9D96
                            • GetAsyncKeyState.USER32(00000012), ref: 008B9DAE
                            • GetKeyState.USER32(00000012), ref: 008B9DC0
                            • GetAsyncKeyState.USER32(0000005B), ref: 008B9DD8
                            • GetKeyState.USER32(0000005B), ref: 008B9DEA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 61b323f545af4d11698720f4e0d3873f35a9ddec385bc5df8c94fa56708f14f4
                            • Instruction ID: 1243cc4e614e6eb889a598bdba0f50685123895e79298d7bc7e832e236af1571
                            • Opcode Fuzzy Hash: 61b323f545af4d11698720f4e0d3873f35a9ddec385bc5df8c94fa56708f14f4
                            • Instruction Fuzzy Hash: 9441D8345047C96DFF31866584543F5BEA0FF11344F48805ADBC69A7C2D7E4A9C8CBA2
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 008D05BC
                            • inet_addr.WSOCK32(?), ref: 008D061C
                            • gethostbyname.WSOCK32(?), ref: 008D0628
                            • IcmpCreateFile.IPHLPAPI ref: 008D0636
                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008D06C6
                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008D06E5
                            • IcmpCloseHandle.IPHLPAPI(?), ref: 008D07B9
                            • WSACleanup.WSOCK32 ref: 008D07BF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                            • String ID: Ping
                            • API String ID: 1028309954-2246546115
                            • Opcode ID: a5a91cfa678977450268adc2c584bcbcf1bda83e22262c5d1a77e058bf09dce5
                            • Instruction ID: a5626c9330f0da9b1ea0711559aaf70bf5dfad36c3dae7309e7064c8296eb6da
                            • Opcode Fuzzy Hash: a5a91cfa678977450268adc2c584bcbcf1bda83e22262c5d1a77e058bf09dce5
                            • Instruction Fuzzy Hash: 4A915B35A042419FD720DF19D888B1ABBE0FB44318F1486AAE469DF7A2C731ED45CF92
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharLower
                            • String ID: cdecl$none$stdcall$winapi
                            • API String ID: 707087890-567219261
                            • Opcode ID: 40617ea7e3b47ae0e868216fae519d05273fa378a706cd61fdcd347bd0a451f1
                            • Instruction ID: 5bd3065001f600dd099638a27f495c7d0eac0d023bbe11cf195ef1cafc478659
                            • Opcode Fuzzy Hash: 40617ea7e3b47ae0e868216fae519d05273fa378a706cd61fdcd347bd0a451f1
                            • Instruction Fuzzy Hash: 09515B31A0011ADACB24DF6CC9419BEB7A6FF65724B21432AE866E73C5DB31DD408B91
                            APIs
                            • CoInitialize.OLE32 ref: 008D3774
                            • CoUninitialize.OLE32 ref: 008D377F
                            • CoCreateInstance.OLE32(?,00000000,00000017,008EFB78,?), ref: 008D37D9
                            • IIDFromString.OLE32(?,?), ref: 008D384C
                            • VariantInit.OLEAUT32(?), ref: 008D38E4
                            • VariantClear.OLEAUT32(?), ref: 008D3936
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 636576611-1287834457
                            • Opcode ID: 9219c58f8fbf4abb83421beaa8f7c8b5f1a156c0d1081a1b979e4265555341f0
                            • Instruction ID: fc36c4972a78ed96b39af14ff05d344dc5873bcceebc0cdcf6aa2da20dec615b
                            • Opcode Fuzzy Hash: 9219c58f8fbf4abb83421beaa8f7c8b5f1a156c0d1081a1b979e4265555341f0
                            • Instruction Fuzzy Hash: DB617970608711AFD310DF54C888A6ABBE4FF49714F100A2AF995DB391D770EA49CB93
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008C33CF
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008C33F0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-3080491070
                            • Opcode ID: 6b2f0519ed1eb0833b69411d8fcdb0cbc3a8bbec69585d3494cf0e70f24aac7d
                            • Instruction ID: 1a96b2c988fe64c9c16ddcdf11cf75656d1a8ac33f047ff0a7262c89ea707da1
                            • Opcode Fuzzy Hash: 6b2f0519ed1eb0833b69411d8fcdb0cbc3a8bbec69585d3494cf0e70f24aac7d
                            • Instruction Fuzzy Hash: 27518C32D00209AADF15EBA4DD42EEEB779FF14341F104065F905B21A2EB316F99DB62
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                            • API String ID: 1256254125-769500911
                            • Opcode ID: efe7969786c8f645909185017477f8863473138faf5c48a57f977875ca55fe17
                            • Instruction ID: 0d3d9917b957d6e296659a36e105a8c980cc0dddc82be6656a2c7dd6320063c5
                            • Opcode Fuzzy Hash: efe7969786c8f645909185017477f8863473138faf5c48a57f977875ca55fe17
                            • Instruction Fuzzy Hash: 7241C432A001269BCB205F7D8C905FE7BA5FBB2758B244229E425DB384F771CD81C790
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 008C53A0
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 008C5416
                            • GetLastError.KERNEL32 ref: 008C5420
                            • SetErrorMode.KERNEL32(00000000,READY), ref: 008C54A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: 6f98d06cf3397eb414cbae203bdf91b146c9ce1cddecf3f30aaacb1e326d98cc
                            • Instruction ID: 9990d6c78c889f161932f7e111b4536acca5619adc8ed0a5c3b39ab52a5f0a5f
                            • Opcode Fuzzy Hash: 6f98d06cf3397eb414cbae203bdf91b146c9ce1cddecf3f30aaacb1e326d98cc
                            • Instruction Fuzzy Hash: 4D3160B5A006089FDB14DF68C884FAA7BB4FF45309F548069E805DB292DB71EDC6CB91
                            APIs
                            • CreateMenu.USER32 ref: 008E3C79
                            • SetMenu.USER32(?,00000000), ref: 008E3C88
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008E3D10
                            • IsMenu.USER32(?), ref: 008E3D24
                            • CreatePopupMenu.USER32 ref: 008E3D2E
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008E3D5B
                            • DrawMenuBar.USER32 ref: 008E3D63
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                            • String ID: 0$F
                            • API String ID: 161812096-3044882817
                            • Opcode ID: f64bd166dc3d1e363854d4c0109370ae544c63657122ce86f1668ace7fc07f97
                            • Instruction ID: 79d11dbb478bb8e4a992e1d345ccbd96bf672877b527d2674966544f7a1a4ad2
                            • Opcode Fuzzy Hash: f64bd166dc3d1e363854d4c0109370ae544c63657122ce86f1668ace7fc07f97
                            • Instruction Fuzzy Hash: EA414A79A01249EFDB14CF65D888AAA7BB5FF4A350F140029E956EB360D730AE11CF94
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 008E3A9D
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 008E3AA0
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E3AC7
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008E3AEA
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 008E3B62
                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 008E3BAC
                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 008E3BC7
                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 008E3BE2
                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 008E3BF6
                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 008E3C13
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow
                            • String ID:
                            • API String ID: 312131281-0
                            • Opcode ID: 3fa51899fd3caaec87763d8ec982dadd285f3d9cabfe62eec0047d29f70b4f2f
                            • Instruction ID: 8977d88d10dc1ea62d78dc53e2d2e14767cf6a3ae85d59677a0c4bf990bb0f22
                            • Opcode Fuzzy Hash: 3fa51899fd3caaec87763d8ec982dadd285f3d9cabfe62eec0047d29f70b4f2f
                            • Instruction Fuzzy Hash: F8617B75900248AFDB21DFA8CC85EEE77B8FB4A714F100199FA15E72A1C770AE81DB50
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 008BB151
                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB165
                            • GetWindowThreadProcessId.USER32(00000000), ref: 008BB16C
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB17B
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 008BB18D
                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB1A6
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB1B8
                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB1FD
                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB212
                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,008BA1E1,?,00000001), ref: 008BB21D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: 1b5bc175e49011e2530d032bdaeecf14747b8de64dafadb639144cc509ff3e24
                            • Instruction ID: e5e91f5683d155037d1c2441e19b6c6d9f9a2822422796f9842a2bcde11b9426
                            • Opcode Fuzzy Hash: 1b5bc175e49011e2530d032bdaeecf14747b8de64dafadb639144cc509ff3e24
                            • Instruction Fuzzy Hash: 3E31A271655204BFDB209F64DC88FAE7BA9FB51311F108009FA11DA2A0D7F89E428F74
                            APIs
                            • _free.LIBCMT ref: 00882C94
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 00882CA0
                            • _free.LIBCMT ref: 00882CAB
                            • _free.LIBCMT ref: 00882CB6
                            • _free.LIBCMT ref: 00882CC1
                            • _free.LIBCMT ref: 00882CCC
                            • _free.LIBCMT ref: 00882CD7
                            • _free.LIBCMT ref: 00882CE2
                            • _free.LIBCMT ref: 00882CED
                            • _free.LIBCMT ref: 00882CFB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 273606be5f97725babb06b3dd5e949c9852a7bace26235e24e338695fb6da4cd
                            • Instruction ID: d3cd2a05789f72623d80f27941368f51a8eb277a4864dbdb97b1e567739032d3
                            • Opcode Fuzzy Hash: 273606be5f97725babb06b3dd5e949c9852a7bace26235e24e338695fb6da4cd
                            • Instruction Fuzzy Hash: 75119376100108AFCB02FF98DC82DDD3FA5FF05350F4244A5FA489B222DA35EE509B91
                            APIs
                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00851459
                            • OleUninitialize.OLE32(?,00000000), ref: 008514F8
                            • UnregisterHotKey.USER32(?), ref: 008516DD
                            • DestroyWindow.USER32(?), ref: 008924B9
                            • FreeLibrary.KERNEL32(?), ref: 0089251E
                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0089254B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                            • String ID: close all
                            • API String ID: 469580280-3243417748
                            • Opcode ID: 39196e31adf651bbfc1dfc8dba0eb01049b3263fe35bb87859102330804b052a
                            • Instruction ID: dd07bb89a26fe0efdb172d37b623b5d310bc5aec3c60a424f8e07e0b57664e3f
                            • Opcode Fuzzy Hash: 39196e31adf651bbfc1dfc8dba0eb01049b3263fe35bb87859102330804b052a
                            • Instruction Fuzzy Hash: 56D156316012129FCF29EF19C899B29F7A0FF05715F1941ADE94AEB252DB30AC1ACF51
                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008C7FAD
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C7FC1
                            • GetFileAttributesW.KERNEL32(?), ref: 008C7FEB
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 008C8005
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8017
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008C8060
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008C80B0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile
                            • String ID: *.*
                            • API String ID: 769691225-438819550
                            • Opcode ID: 9ff5d5071c7a699705802187749ba30cd6b2757f76b3b92f91877f493c91eb34
                            • Instruction ID: b19f3c862bd2e8fff42236ce8dc213fd89b51fe961165a341529bb80076fefa3
                            • Opcode Fuzzy Hash: 9ff5d5071c7a699705802187749ba30cd6b2757f76b3b92f91877f493c91eb34
                            • Instruction Fuzzy Hash: 31818F725082459BCB20EF18C884EAAB3E8FF85754F14486EF889D7250EB35DD49CF52
                            APIs
                            • SetWindowLongW.USER32(?,000000EB), ref: 00855C7A
                              • Part of subcall function 00855D0A: GetClientRect.USER32(?,?), ref: 00855D30
                              • Part of subcall function 00855D0A: GetWindowRect.USER32(?,?), ref: 00855D71
                              • Part of subcall function 00855D0A: ScreenToClient.USER32(?,?), ref: 00855D99
                            • GetDC.USER32 ref: 008946F5
                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00894708
                            • SelectObject.GDI32(00000000,00000000), ref: 00894716
                            • SelectObject.GDI32(00000000,00000000), ref: 0089472B
                            • ReleaseDC.USER32(?,00000000), ref: 00894733
                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 008947C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                            • String ID: U
                            • API String ID: 4009187628-3372436214
                            • Opcode ID: 42a082816f45759b7e7f903c865ddda619580e47f8e3d489c2d16638cf4168a5
                            • Instruction ID: 3e113767c430fd01f8232ae6f95a1d0896f7cfb44751561c81d35cad4c499116
                            • Opcode Fuzzy Hash: 42a082816f45759b7e7f903c865ddda619580e47f8e3d489c2d16638cf4168a5
                            • Instruction Fuzzy Hash: 8471DF3440020DEFCF21AFA4C984EAA3BB1FF56325F181269ED51DA266C7309C46DF50
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008C35E4
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • LoadStringW.USER32(00922390,?,00000FFF,?), ref: 008C360A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-2391861430
                            • Opcode ID: 20a9c30e17c71772ee5ee651b9fe43a3b811bd35e70cbd8bf409569cd4281c6e
                            • Instruction ID: ae17ff08e444d3302486e07363a6dacf16106bb10b36f9f568aaf15300076022
                            • Opcode Fuzzy Hash: 20a9c30e17c71772ee5ee651b9fe43a3b811bd35e70cbd8bf409569cd4281c6e
                            • Instruction Fuzzy Hash: BB517F72D00209BACF14EBA4DC42EEEBB79FF14341F544129F505B21A2EB315B99DB62
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                              • Part of subcall function 0086912D: GetCursorPos.USER32(?), ref: 00869141
                              • Part of subcall function 0086912D: ScreenToClient.USER32(00000000,?), ref: 0086915E
                              • Part of subcall function 0086912D: GetAsyncKeyState.USER32(00000001), ref: 00869183
                              • Part of subcall function 0086912D: GetAsyncKeyState.USER32(00000002), ref: 0086919D
                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 008E8B6B
                            • ImageList_EndDrag.COMCTL32 ref: 008E8B71
                            • ReleaseCapture.USER32 ref: 008E8B77
                            • SetWindowTextW.USER32(?,00000000), ref: 008E8C12
                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 008E8C25
                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 008E8CFF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                            • API String ID: 1924731296-2107944366
                            • Opcode ID: c754485d8cb8f1eab0a5875810b248278a71e99d84596b4d71bf8319c487177a
                            • Instruction ID: f848ad28c70841efc1dbb7917e88f2508a0ec98985b06efca68fdbbc0a85f174
                            • Opcode Fuzzy Hash: c754485d8cb8f1eab0a5875810b248278a71e99d84596b4d71bf8319c487177a
                            • Instruction Fuzzy Hash: 0151CB70104340AFD714DF28DC96BAE77E4FB89714F10062DF996A72E1CB709959CB62
                            APIs
                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008CC272
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008CC29A
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008CC2CA
                            • GetLastError.KERNEL32 ref: 008CC322
                            • SetEvent.KERNEL32(?), ref: 008CC336
                            • InternetCloseHandle.WININET(00000000), ref: 008CC341
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                            • String ID:
                            • API String ID: 3113390036-3916222277
                            • Opcode ID: 60eeca1c94881fa6276695b05136039b1c59ba006c7b14ffeaf2994f782264b0
                            • Instruction ID: 992fae716d7d8d308ec63b09bb3e5691039b8755da87ccdbc65f34b47158e649
                            • Opcode Fuzzy Hash: 60eeca1c94881fa6276695b05136039b1c59ba006c7b14ffeaf2994f782264b0
                            • Instruction Fuzzy Hash: 0E3169B1A00648AFD7219FA8AC88FAB7BFCFB49744B14851EF44AD6201DB30DD459B61
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00893AAF,?,?,Bad directive syntax error,008ECC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 008B98BC
                            • LoadStringW.USER32(00000000,?,00893AAF,?), ref: 008B98C3
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 008B9987
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HandleLoadMessageModuleString_wcslen
                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                            • API String ID: 858772685-4153970271
                            • Opcode ID: 777c3a22e9ba65716d2a34584ab71584e1ccd11e3642afba8f0bb3931c899774
                            • Instruction ID: ea77af26700e0ad0dfed3c61acdc748069d926b524d6cab2683aa35111624a17
                            • Opcode Fuzzy Hash: 777c3a22e9ba65716d2a34584ab71584e1ccd11e3642afba8f0bb3931c899774
                            • Instruction Fuzzy Hash: C221A631D0021EEBCF11AF94CC06EEE7B35FF14305F044465F615A51A2DB719A58CB12
                            APIs
                            • GetParent.USER32 ref: 008B20AB
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 008B20C0
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 008B214D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassMessageNameParentSend
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 1290815626-3381328864
                            • Opcode ID: 986fc506688163c34ffd397b55375779f91a64dd94fa7c3e0c8073384e1d5c0e
                            • Instruction ID: 2d017838142aecb6f6c0b886ec9d27854ec94be3a46d235baf2a15bce25f3708
                            • Opcode Fuzzy Hash: 986fc506688163c34ffd397b55375779f91a64dd94fa7c3e0c8073384e1d5c0e
                            • Instruction Fuzzy Hash: AE1136767C870BF9F6012228DC06CE7739CFB54328B21401AFB08E41E5FA65B8825A14
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                            • String ID:
                            • API String ID: 1282221369-0
                            • Opcode ID: 457f440411427c27ad8670c9880c82f037aaebfd69d8f615cdc5170f67d19933
                            • Instruction ID: e83bfcbb41a16c12be10e54e77896afa2cc7b4315627e35516ffef19a15746d2
                            • Opcode Fuzzy Hash: 457f440411427c27ad8670c9880c82f037aaebfd69d8f615cdc5170f67d19933
                            • Instruction Fuzzy Hash: 36614771908305AFEF31BFB89C81A697BA5FF05310F14416EFA44D7286DB719D0287A1
                            APIs
                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 008A6890
                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008A68A9
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008A68B9
                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008A68D1
                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008A68F2
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868874,00000000,00000000,00000000,000000FF,00000000), ref: 008A6901
                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 008A691E
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00868874,00000000,00000000,00000000,000000FF,00000000), ref: 008A692D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                            • String ID:
                            • API String ID: 1268354404-0
                            • Opcode ID: 6e8afcc140d82e297ef30caeeeb93d6d30fa5d03a33517b75b44abc0633b160b
                            • Instruction ID: 96a29b9f4ccbc55b958054db9a9a7e273d5753ae67ebb4b369f8af60548567c1
                            • Opcode Fuzzy Hash: 6e8afcc140d82e297ef30caeeeb93d6d30fa5d03a33517b75b44abc0633b160b
                            • Instruction Fuzzy Hash: 7F519C70A00209EFEB20CF24CC95FAA7BB5FB54760F144618F956D72A0EB70E9A1DB40
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008CC182
                            • GetLastError.KERNEL32 ref: 008CC195
                            • SetEvent.KERNEL32(?), ref: 008CC1A9
                              • Part of subcall function 008CC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008CC272
                              • Part of subcall function 008CC253: GetLastError.KERNEL32 ref: 008CC322
                              • Part of subcall function 008CC253: SetEvent.KERNEL32(?), ref: 008CC336
                              • Part of subcall function 008CC253: InternetCloseHandle.WININET(00000000), ref: 008CC341
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                            • String ID:
                            • API String ID: 337547030-0
                            • Opcode ID: ba7d425069b8c1749f0f46da75e5f61dbafe99afdc45108b707e6666c77c8d92
                            • Instruction ID: 64b8a2412c2c58d58af3caa200e788ba0eb6fc5f8a205ac49a2ffbb838432537
                            • Opcode Fuzzy Hash: ba7d425069b8c1749f0f46da75e5f61dbafe99afdc45108b707e6666c77c8d92
                            • Instruction Fuzzy Hash: 65316D71A00645AFDB219FA9DC44F76BBF9FF18310B14841EF95AC6610D731E8159BA0
                            APIs
                              • Part of subcall function 008B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B3A57
                              • Part of subcall function 008B3A3D: GetCurrentThreadId.KERNEL32 ref: 008B3A5E
                              • Part of subcall function 008B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008B25B3), ref: 008B3A65
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B25BD
                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008B25DB
                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008B25DF
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B25E9
                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 008B2601
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 008B2605
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 008B260F
                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 008B2623
                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 008B2627
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                            • String ID:
                            • API String ID: 2014098862-0
                            • Opcode ID: 91f93018c119401cfcc391d57ff691856d8cfea0315b766b375d9c3a00bb22ed
                            • Instruction ID: 958cb3a7e1849fdeacb8628ab27a411eaa401fc34ee1c5cef41d56ea7be3db89
                            • Opcode Fuzzy Hash: 91f93018c119401cfcc391d57ff691856d8cfea0315b766b375d9c3a00bb22ed
                            • Instruction Fuzzy Hash: 5D01D830790664BBFB1067699CCAF9A3F59FB5EB12F100015F314EE1E1C9E114458A6A
                            APIs
                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,008B1449,?,?,00000000), ref: 008B180C
                            • HeapAlloc.KERNEL32(00000000,?,008B1449,?,?,00000000), ref: 008B1813
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,008B1449,?,?,00000000), ref: 008B1828
                            • GetCurrentProcess.KERNEL32(?,00000000,?,008B1449,?,?,00000000), ref: 008B1830
                            • DuplicateHandle.KERNEL32(00000000,?,008B1449,?,?,00000000), ref: 008B1833
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,008B1449,?,?,00000000), ref: 008B1843
                            • GetCurrentProcess.KERNEL32(008B1449,00000000,?,008B1449,?,?,00000000), ref: 008B184B
                            • DuplicateHandle.KERNEL32(00000000,?,008B1449,?,?,00000000), ref: 008B184E
                            • CreateThread.KERNEL32(00000000,00000000,008B1874,00000000,00000000,00000000), ref: 008B1868
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: e6fe18b7696c14ea8a8dcc6ca1532c3afdb27a8d5810184330a864d4ef0ceb3d
                            • Instruction ID: 773610b90b063ef91b7c48054d3491f9a04b0311fb113b10267b288b02b52891
                            • Opcode Fuzzy Hash: e6fe18b7696c14ea8a8dcc6ca1532c3afdb27a8d5810184330a864d4ef0ceb3d
                            • Instruction Fuzzy Hash: E601BBB5640348BFE710ABA5DC8DF6B7BACFB89B11F404411FA15DF2A1CA749801CB20
                            APIs
                              • Part of subcall function 008BD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 008BD501
                              • Part of subcall function 008BD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 008BD50F
                              • Part of subcall function 008BD4DC: CloseHandle.KERNEL32(00000000), ref: 008BD5DC
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008DA16D
                            • GetLastError.KERNEL32 ref: 008DA180
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008DA1B3
                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 008DA268
                            • GetLastError.KERNEL32(00000000), ref: 008DA273
                            • CloseHandle.KERNEL32(00000000), ref: 008DA2C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                            • String ID: SeDebugPrivilege
                            • API String ID: 2533919879-2896544425
                            • Opcode ID: 17f6439a9b087b6253703038af6008ddc45cc7bdc7288cac3aeb6bdadc9cdb36
                            • Instruction ID: 0dd178bae4804fb0f3448ecc25e03239eb2be0639d8810aa7d48e6d363b1aac1
                            • Opcode Fuzzy Hash: 17f6439a9b087b6253703038af6008ddc45cc7bdc7288cac3aeb6bdadc9cdb36
                            • Instruction Fuzzy Hash: 43618C30204242AFD714DF19C894F16BBE1FF44318F64859DE8668B7A2C772ED49CB92
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 008E3925
                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 008E393A
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 008E3954
                            • _wcslen.LIBCMT ref: 008E3999
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 008E39C6
                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008E39F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcslen
                            • String ID: SysListView32
                            • API String ID: 2147712094-78025650
                            • Opcode ID: 19c977425e620b4697cb2957e5dcec35eadf68d048fb4071b7c09a8fe31f0417
                            • Instruction ID: 9d54ca97b2583e91aab2877594e967ef73ee076aaf73cc8d744ad13e388bd93f
                            • Opcode Fuzzy Hash: 19c977425e620b4697cb2957e5dcec35eadf68d048fb4071b7c09a8fe31f0417
                            • Instruction Fuzzy Hash: D941E371A00259ABEF219F65CC49BEA7BA9FF09350F10012AF948E7291D771DE80CB90
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008BBCFD
                            • IsMenu.USER32(00000000), ref: 008BBD1D
                            • CreatePopupMenu.USER32 ref: 008BBD53
                            • GetMenuItemCount.USER32(00EF5900), ref: 008BBDA4
                            • InsertMenuItemW.USER32(00EF5900,?,00000001,00000030), ref: 008BBDCC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                            • String ID: 0$2
                            • API String ID: 93392585-3793063076
                            • Opcode ID: 59dc9358032c1c38602318e61396901a971254691b196df126eeb0e629574af2
                            • Instruction ID: 967b6863e810c6f3872b134290d6182cc1dca0ee41a85a0f638924d907ce2720
                            • Opcode Fuzzy Hash: 59dc9358032c1c38602318e61396901a971254691b196df126eeb0e629574af2
                            • Instruction Fuzzy Hash: 99518C70A042099BDF20CFA8D884BEEBBF4FF45354F184659E411DB391D7B89945CB62
                            APIs
                            • LoadIconW.USER32(00000000,00007F03), ref: 008BC913
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2457776203-404129466
                            • Opcode ID: d78230f5d58c72c2aa266afb70e21907c57936cd65cc29462cd1c6f4fafeb56f
                            • Instruction ID: 7c376e686a2c6071a120061a7b2323e7da09a662424c8589910a463d3332981e
                            • Opcode Fuzzy Hash: d78230f5d58c72c2aa266afb70e21907c57936cd65cc29462cd1c6f4fafeb56f
                            • Instruction Fuzzy Hash: FE110D31B8930BBAF7015B549C83CEB6B9CFF55359B10403AF504E63C2D7709D805265
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$LocalTime
                            • String ID:
                            • API String ID: 952045576-0
                            • Opcode ID: a053c29fe8a25d68d483e3c06d751ad65fcddf425c680529f47f543a4401afd8
                            • Instruction ID: a90ae1a26c140a9964c39f2ad774660a009ae38518a6769e7f48f16125573f65
                            • Opcode Fuzzy Hash: a053c29fe8a25d68d483e3c06d751ad65fcddf425c680529f47f543a4401afd8
                            • Instruction Fuzzy Hash: B1414365D1021866CB11EBF8888AACF77A8FF45710F508566E51CE3226FB34E255C3A7
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008A682C,00000004,00000000,00000000), ref: 0086F953
                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,008A682C,00000004,00000000,00000000), ref: 008AF3D1
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008A682C,00000004,00000000,00000000), ref: 008AF454
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 41dd49a1c5c014be22166f97917f7a80de043c417aee7683bb70b7f2b2171965
                            • Instruction ID: 07d04e35b2965ef75adf36f38a3521b77cf84ed2fec40d4cd4ab87b106773e19
                            • Opcode Fuzzy Hash: 41dd49a1c5c014be22166f97917f7a80de043c417aee7683bb70b7f2b2171965
                            • Instruction Fuzzy Hash: 9A411C31508780BAE7398B6DE8C8B2A7F91FB56318F16453CE397D6A63C631D881DB11
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 008E2D1B
                            • GetDC.USER32(00000000), ref: 008E2D23
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008E2D2E
                            • ReleaseDC.USER32(00000000,00000000), ref: 008E2D3A
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 008E2D76
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 008E2D87
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,008E5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 008E2DC2
                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 008E2DE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                            • String ID:
                            • API String ID: 3864802216-0
                            • Opcode ID: c3093e5d2c583aa7a217f1ef1c208952a86f304f2c0cd51769b978ba4faa899b
                            • Instruction ID: 11f34c018a826fbbcec4580972c83540614e14e000ecd3209b1124b5dbd9f293
                            • Opcode Fuzzy Hash: c3093e5d2c583aa7a217f1ef1c208952a86f304f2c0cd51769b978ba4faa899b
                            • Instruction Fuzzy Hash: CF318B72601294BBEB118F558C8AFEB3BADFB4A711F044055FE08DE2A1C6759C41CBA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: aada87660131ffda7b79042e38450537a7fdc3c2eaf08b357f7b0440bd625318
                            • Instruction ID: 0c7542ebcff890124999f8e5fecebbc7e17aacc09d73521edbaba0d4ea792ac9
                            • Opcode Fuzzy Hash: aada87660131ffda7b79042e38450537a7fdc3c2eaf08b357f7b0440bd625318
                            • Instruction Fuzzy Hash: 4421FC7174091977E61455298D82FFB335CFF32398F644020FE09DAB86FB28EE1182A6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: NULL Pointer assignment$Not an Object type
                            • API String ID: 0-572801152
                            • Opcode ID: b5d33eb75055314273002b38b906c1ddfa70565af93d2431d9f69588e3840331
                            • Instruction ID: d6685004261426e335042fa84c9edc1f928cbe46dfc2460e0a15c2d88593db44
                            • Opcode Fuzzy Hash: b5d33eb75055314273002b38b906c1ddfa70565af93d2431d9f69588e3840331
                            • Instruction Fuzzy Hash: 9ED17C71A0060A9FDF14CFA8C881AAEB7B5FB48354F14826AE915EB381E771DD45CB90
                            APIs
                            • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,008917FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 008915CE
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008917FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00891651
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,008917FB,?,008917FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008916E4
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008917FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008916FB
                              • Part of subcall function 00883820: RtlAllocateHeap.NTDLL(00000000,?,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6,?,00851129), ref: 00883852
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,008917FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00891777
                            • __freea.LIBCMT ref: 008917A2
                            • __freea.LIBCMT ref: 008917AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                            • String ID:
                            • API String ID: 2829977744-0
                            • Opcode ID: f788290dea0b3b5a494771552d62f2b002d19b7d3fc0ff276204605cb7c0f6a4
                            • Instruction ID: 226110a6951b50843e45b3a3c07afd30a369ab111bca065af77fe0e58d862a53
                            • Opcode Fuzzy Hash: f788290dea0b3b5a494771552d62f2b002d19b7d3fc0ff276204605cb7c0f6a4
                            • Instruction Fuzzy Hash: 1491C472E08217AADF21AEA4CC89AEE7BB5FF45714F1D4559E901E7141DB35CC40C760
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearInit
                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 2610073882-625585964
                            • Opcode ID: 1592046ccbd0582b18f4302c970f638fd102a3fbd447339ada6becfc7d437317
                            • Instruction ID: b5830a9a2ea5072f676b547e2c65139c1dc7c43a64af1fa0c6894c79d0b56155
                            • Opcode Fuzzy Hash: 1592046ccbd0582b18f4302c970f638fd102a3fbd447339ada6becfc7d437317
                            • Instruction Fuzzy Hash: D5917071A00219ABDF20CFA5D884FAEBBB8FF46714F10865AF515EB281D7709945CFA0
                            APIs
                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 008C125C
                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 008C1284
                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008C12A8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C12D8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C135F
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C13C4
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008C1430
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                            • String ID:
                            • API String ID: 2550207440-0
                            • Opcode ID: fe64d255706b59e8c4cf57d5eb0e8a63873375f184856ee629c026efd11e9f00
                            • Instruction ID: 7c03884a8a60e31116d39cc7c0b2fd52baeb6462e94212c42685b3ce875573d2
                            • Opcode Fuzzy Hash: fe64d255706b59e8c4cf57d5eb0e8a63873375f184856ee629c026efd11e9f00
                            • Instruction Fuzzy Hash: 6191CE75A002199FDB04DFA8C8C8FAEB7B5FF46319F108029E900EB292D774E941CB95
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: ca60d4bda3cb8ba842a952d210613871cd0928203beb9f846ff7977bb446fb66
                            • Instruction ID: dd6bc56aa17f2ff4c23bb881b789cbe2758fca1318b33cbdea1a43429d6504b3
                            • Opcode Fuzzy Hash: ca60d4bda3cb8ba842a952d210613871cd0928203beb9f846ff7977bb446fb66
                            • Instruction Fuzzy Hash: 90911571D00219EFCB10CFA9CC88AEEBBB8FF49320F154059E556F7291D674AA42DB60
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 008D396B
                            • CharUpperBuffW.USER32(?,?), ref: 008D3A7A
                            • _wcslen.LIBCMT ref: 008D3A8A
                            • VariantClear.OLEAUT32(?), ref: 008D3C1F
                              • Part of subcall function 008C0CDF: VariantInit.OLEAUT32(00000000), ref: 008C0D1F
                              • Part of subcall function 008C0CDF: VariantCopy.OLEAUT32(?,?), ref: 008C0D28
                              • Part of subcall function 008C0CDF: VariantClear.OLEAUT32(?), ref: 008C0D34
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                            • API String ID: 4137639002-1221869570
                            • Opcode ID: be4a9b30bd74efc143a745dc2a0c4960f56c6f218d0aa3adbbf231714edb1293
                            • Instruction ID: af6356813cba4edebd68add3a4860856e4d914defd6406b4fc3fe86851f83c6d
                            • Opcode Fuzzy Hash: be4a9b30bd74efc143a745dc2a0c4960f56c6f218d0aa3adbbf231714edb1293
                            • Instruction Fuzzy Hash: 79911375A083059FC704DF68C48196AB7E4FB89314F14892EF899DB351DB31EE45CB92
                            APIs
                              • Part of subcall function 008B000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?,?,008B035E), ref: 008B002B
                              • Part of subcall function 008B000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?), ref: 008B0046
                              • Part of subcall function 008B000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?), ref: 008B0054
                              • Part of subcall function 008B000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?), ref: 008B0064
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 008D4C51
                            • _wcslen.LIBCMT ref: 008D4D59
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 008D4DCF
                            • CoTaskMemFree.OLE32(?), ref: 008D4DDA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                            • String ID: NULL Pointer assignment
                            • API String ID: 614568839-2785691316
                            • Opcode ID: 8c73a7b89e67c7bdd3b345a6d778f7f12919996603e55cab7f42105653525179
                            • Instruction ID: 7163e42d4f1adbd9bf2dfc42e4ab0a0ed9590604a15e9d0a38fa36560257534e
                            • Opcode Fuzzy Hash: 8c73a7b89e67c7bdd3b345a6d778f7f12919996603e55cab7f42105653525179
                            • Instruction Fuzzy Hash: B591E771D0021DAFDF14DFA4C891AEEB7B9FF08314F10466AE915E7251EB309A458F61
                            APIs
                            • GetMenu.USER32(?), ref: 008E2183
                            • GetMenuItemCount.USER32(00000000), ref: 008E21B5
                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008E21DD
                            • _wcslen.LIBCMT ref: 008E2213
                            • GetMenuItemID.USER32(?,?), ref: 008E224D
                            • GetSubMenu.USER32(?,?), ref: 008E225B
                              • Part of subcall function 008B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B3A57
                              • Part of subcall function 008B3A3D: GetCurrentThreadId.KERNEL32 ref: 008B3A5E
                              • Part of subcall function 008B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008B25B3), ref: 008B3A65
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008E22E3
                              • Part of subcall function 008BE97B: Sleep.KERNEL32 ref: 008BE9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                            • String ID:
                            • API String ID: 4196846111-0
                            • Opcode ID: a4eccabb442ddd185df3285bb68062a09094725874fcc427a2eeb930acc69c70
                            • Instruction ID: 2fbdef5ed51e7f91690e1f77cd415d398bc05bec842f413771283cd7eec38978
                            • Opcode Fuzzy Hash: a4eccabb442ddd185df3285bb68062a09094725874fcc427a2eeb930acc69c70
                            • Instruction Fuzzy Hash: B5719D75E00245AFCB10EF69C881AAEBBF9FF49310F148459E916EB351DB34EE418B91
                            APIs
                            • GetParent.USER32(?), ref: 008BAEF9
                            • GetKeyboardState.USER32(?), ref: 008BAF0E
                            • SetKeyboardState.USER32(?), ref: 008BAF6F
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 008BAF9D
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 008BAFBC
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 008BAFFD
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008BB020
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 2dd05aea7b5abb72bf7e9429e2b28c2ebbafcf44cbbae6d64eb6ce2e4909e781
                            • Instruction ID: 3fe316008c58b65e2df843e43fc1e0cfe421bb8464450125c885845d224bb816
                            • Opcode Fuzzy Hash: 2dd05aea7b5abb72bf7e9429e2b28c2ebbafcf44cbbae6d64eb6ce2e4909e781
                            • Instruction Fuzzy Hash: D651D2A0A046D53DFB3A52388845BFA7EA9BB06304F088489E1E5D56C2C7D9E885D752
                            APIs
                            • GetParent.USER32(00000000), ref: 008BAD19
                            • GetKeyboardState.USER32(?), ref: 008BAD2E
                            • SetKeyboardState.USER32(?), ref: 008BAD8F
                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 008BADBB
                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 008BADD8
                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 008BAE17
                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 008BAE38
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: ea020a17074a6820e92e3a1e5894ebbe0dc06ddbb33f2559d057688535650192
                            • Instruction ID: dec22b8b1e0776568214cc5b3c1402008d2cc592c4090d5ddc7b95d7cdac3161
                            • Opcode Fuzzy Hash: ea020a17074a6820e92e3a1e5894ebbe0dc06ddbb33f2559d057688535650192
                            • Instruction Fuzzy Hash: A351D5A19047D53DFB3B8324CC95BFA7E99BB46300F0C8588E1D5D6AD2D294EC84D762
                            APIs
                            • GetConsoleCP.KERNEL32(00893CD6,?,?,?,?,?,?,?,?,00885BA3,?,?,00893CD6,?,?), ref: 00885470
                            • __fassign.LIBCMT ref: 008854EB
                            • __fassign.LIBCMT ref: 00885506
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00893CD6,00000005,00000000,00000000), ref: 0088552C
                            • WriteFile.KERNEL32(?,00893CD6,00000000,00885BA3,00000000,?,?,?,?,?,?,?,?,?,00885BA3,?), ref: 0088554B
                            • WriteFile.KERNEL32(?,?,00000001,00885BA3,00000000,?,?,?,?,?,?,?,?,?,00885BA3,?), ref: 00885584
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID:
                            • API String ID: 1324828854-0
                            • Opcode ID: 6bfe67ee889528a3e249d234a710d54082f4660263c086d62ff65a6c6e692cc3
                            • Instruction ID: 5cf9fa33119cbbaf2e6f65b5b692a3e6e2e20a21b9958e7f86fd9642454978cb
                            • Opcode Fuzzy Hash: 6bfe67ee889528a3e249d234a710d54082f4660263c086d62ff65a6c6e692cc3
                            • Instruction Fuzzy Hash: D851B1B1A00649AFDB10DFA8D895AEEBBF9FF09300F14415AF955E7291E730DA41CB60
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 00872D4B
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00872D53
                            • _ValidateLocalCookies.LIBCMT ref: 00872DE1
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00872E0C
                            • _ValidateLocalCookies.LIBCMT ref: 00872E61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: c1e23e27e0a9a3bba16131ebdadb79694a5b8103495a3a9912b9997c3dbf5d05
                            • Instruction ID: f36d844faebd32373b945f4869286d77e35259638d649b060558963f2ac62b60
                            • Opcode Fuzzy Hash: c1e23e27e0a9a3bba16131ebdadb79694a5b8103495a3a9912b9997c3dbf5d05
                            • Instruction Fuzzy Hash: 69418234E0020DABCF20DF68C855A9EBFA5FF45328F14C165E819EB256D731EA15CB92
                            APIs
                              • Part of subcall function 008D304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008D307A
                              • Part of subcall function 008D304E: _wcslen.LIBCMT ref: 008D309B
                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008D1112
                            • WSAGetLastError.WSOCK32 ref: 008D1121
                            • WSAGetLastError.WSOCK32 ref: 008D11C9
                            • closesocket.WSOCK32(00000000), ref: 008D11F9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 2675159561-0
                            • Opcode ID: 7990a8c25b6e1e07d534909aa7802033189888e90519c087e80996c33166fdec
                            • Instruction ID: a6c9dd90685124c9a0a4a598e23d756fa669a188d481674458a37c06932a69ea
                            • Opcode Fuzzy Hash: 7990a8c25b6e1e07d534909aa7802033189888e90519c087e80996c33166fdec
                            • Instruction Fuzzy Hash: 8341C031600214AFDF109F68CC88BAABBA9FF45369F14825AFD15DB391C770AD45CBA1
                            APIs
                              • Part of subcall function 008BDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008BCF22,?), ref: 008BDDFD
                              • Part of subcall function 008BDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008BCF22,?), ref: 008BDE16
                            • lstrcmpiW.KERNEL32(?,?), ref: 008BCF45
                            • MoveFileW.KERNEL32(?,?), ref: 008BCF7F
                            • _wcslen.LIBCMT ref: 008BD005
                            • _wcslen.LIBCMT ref: 008BD01B
                            • SHFileOperationW.SHELL32(?), ref: 008BD061
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                            • String ID: \*.*
                            • API String ID: 3164238972-1173974218
                            • Opcode ID: 908442de41894aec52bd3b1215dafc1694a2ccfdcfd75e13b10cf77d96e83176
                            • Instruction ID: 8cf34ffa8435a780eb4a07e35612a3af8f0053e12541327c24ca4b21123f8226
                            • Opcode Fuzzy Hash: 908442de41894aec52bd3b1215dafc1694a2ccfdcfd75e13b10cf77d96e83176
                            • Instruction Fuzzy Hash: 2D4135719452199FDF12EFA4C981AEDB7B9FF08340F1000E6E549EB242EF74A649CB51
                            APIs
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008E2E1C
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008E2E4F
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008E2E84
                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 008E2EB6
                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 008E2EE0
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008E2EF1
                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 008E2F0B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LongWindow$MessageSend
                            • String ID:
                            • API String ID: 2178440468-0
                            • Opcode ID: 9e61807a88b7ead4fe8a1d0ea65665bfe5fff59d3f62beb3ad446e3fa7c74c47
                            • Instruction ID: d2ecf5a2cb060893092c921dcbdbae7df3f8750ec5106e58bb5c4fb586f28af0
                            • Opcode Fuzzy Hash: 9e61807a88b7ead4fe8a1d0ea65665bfe5fff59d3f62beb3ad446e3fa7c74c47
                            • Instruction Fuzzy Hash: 643114346042A5AFDB20CF59DC84F6537E8FB6A710F1401A4F911CF2B2CB71AC919B41
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008B7769
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008B778F
                            • SysAllocString.OLEAUT32(00000000), ref: 008B7792
                            • SysAllocString.OLEAUT32(?), ref: 008B77B0
                            • SysFreeString.OLEAUT32(?), ref: 008B77B9
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 008B77DE
                            • SysAllocString.OLEAUT32(?), ref: 008B77EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 6814e75a9c3fc26deaffcc0f55ba6049e6c5506fe800969a7634208f775d4691
                            • Instruction ID: 83cec8c95394b94eb083e8ee31354b3cb13654bfede7fc6a2417bf3cafc7a872
                            • Opcode Fuzzy Hash: 6814e75a9c3fc26deaffcc0f55ba6049e6c5506fe800969a7634208f775d4691
                            • Instruction Fuzzy Hash: 60219F76A04219AFDB10DFA8DC88CFA77ACFB49364B108025BA14DF291DA70DC428768
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008B7842
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008B7868
                            • SysAllocString.OLEAUT32(00000000), ref: 008B786B
                            • SysAllocString.OLEAUT32 ref: 008B788C
                            • SysFreeString.OLEAUT32 ref: 008B7895
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 008B78AF
                            • SysAllocString.OLEAUT32(?), ref: 008B78BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 145c89a2a74a712edc5bbaeff74995d9bb0d0dfb84a4375d477f9090ecf00b37
                            • Instruction ID: b553f65a3c0f093a19f573712a3b608b4acba7b256ebadd0e5999859b1083b24
                            • Opcode Fuzzy Hash: 145c89a2a74a712edc5bbaeff74995d9bb0d0dfb84a4375d477f9090ecf00b37
                            • Instruction Fuzzy Hash: 00214135A08218AFDB109FB8DC88DAA77ECFB497647108135F915CB2A1D674DC45CB68
                            APIs
                            • GetStdHandle.KERNEL32(0000000C), ref: 008C04F2
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008C052E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: ab5acf2d1e6e5e8cc8eb2d816bdfe50e300b37c25689ea194f3389ce2d4395b4
                            • Instruction ID: 68980889e8f6390aa5e34f73199aac1f7523c7dcdb6de6affef85a52a05bec30
                            • Opcode Fuzzy Hash: ab5acf2d1e6e5e8cc8eb2d816bdfe50e300b37c25689ea194f3389ce2d4395b4
                            • Instruction Fuzzy Hash: C6210675A00209EBDB209F69D844F9A7BB8FF447A5F204A1DE9A1E62E0D770D941CF20
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 008C05C6
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008C0601
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: c4a1d230015b5d27d76af3d595987fe74b3f7e56153f99fb1adc5ab75e582d0d
                            • Instruction ID: 290f0d3b8eee3ee46b32aa7dfb49c643fba371466c30249eae4d15852bf84cfd
                            • Opcode Fuzzy Hash: c4a1d230015b5d27d76af3d595987fe74b3f7e56153f99fb1adc5ab75e582d0d
                            • Instruction Fuzzy Hash: 41216D75900315DBDB209F698844F9A77B8FFA5BA4F200A1DE9A1E72E0D770D861CF10
                            APIs
                              • Part of subcall function 0085600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0085604C
                              • Part of subcall function 0085600E: GetStockObject.GDI32(00000011), ref: 00856060
                              • Part of subcall function 0085600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0085606A
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 008E4112
                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 008E411F
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 008E412A
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 008E4139
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 008E4145
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$CreateObjectStockWindow
                            • String ID: Msctls_Progress32
                            • API String ID: 1025951953-3636473452
                            • Opcode ID: 4b4e51af37a6a4b2008c62e189bdfb643b23ca80059f86bb266f2f50136b9470
                            • Instruction ID: d1ace1a02a594c461a58c054efd317c2a7eed521c2c76c708101cbd6782a3460
                            • Opcode Fuzzy Hash: 4b4e51af37a6a4b2008c62e189bdfb643b23ca80059f86bb266f2f50136b9470
                            • Instruction Fuzzy Hash: F811E2B214021DBEEF108F65CC81EE77FADFF09398F004120BA18E20A0C6729C61DBA0
                            APIs
                              • Part of subcall function 0088D7A3: _free.LIBCMT ref: 0088D7CC
                            • _free.LIBCMT ref: 0088D82D
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 0088D838
                            • _free.LIBCMT ref: 0088D843
                            • _free.LIBCMT ref: 0088D897
                            • _free.LIBCMT ref: 0088D8A2
                            • _free.LIBCMT ref: 0088D8AD
                            • _free.LIBCMT ref: 0088D8B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                            • Instruction ID: 5f24228c44c7a34c1c4cf78ccd6ddbeb06e22e38d9b15bbc4b16c1e5ff1bd501
                            • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                            • Instruction Fuzzy Hash: 1D110771940B04AADA21BFB8CD47FCB7BDCFF04700F404825F299E64D2DA69B5058762
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 008BDA74
                            • LoadStringW.USER32(00000000), ref: 008BDA7B
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 008BDA91
                            • LoadStringW.USER32(00000000), ref: 008BDA98
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008BDADC
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 008BDAB9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 4072794657-3128320259
                            • Opcode ID: 4e854a9571a5c774959e5ac81c8f1dc73fc072636018e77fc70062f4ea9fffda
                            • Instruction ID: cfba08797ef969bf8c242aeea160c9f5890432a8dadd7da54003362f6293ef78
                            • Opcode Fuzzy Hash: 4e854a9571a5c774959e5ac81c8f1dc73fc072636018e77fc70062f4ea9fffda
                            • Instruction Fuzzy Hash: B2014BF2900358BFEB10ABE49D89EEB776CFB08305F400496B756E6051EA749E858B74
                            APIs
                            • InterlockedExchange.KERNEL32(00EED200,00EED200), ref: 008C097B
                            • EnterCriticalSection.KERNEL32(00EED1E0,00000000), ref: 008C098D
                            • TerminateThread.KERNEL32(00EE9D88,000001F6), ref: 008C099B
                            • WaitForSingleObject.KERNEL32(00EE9D88,000003E8), ref: 008C09A9
                            • CloseHandle.KERNEL32(00EE9D88), ref: 008C09B8
                            • InterlockedExchange.KERNEL32(00EED200,000001F6), ref: 008C09C8
                            • LeaveCriticalSection.KERNEL32(00EED1E0), ref: 008C09CF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: 04426c7f0a38c044808a48762de5af57b4bd552f843201027e69fbfd5428721d
                            • Instruction ID: 806de1bb356ca9a64f5814719b6ab6bc4f525acb58e47a3478611a7fda90f3e3
                            • Opcode Fuzzy Hash: 04426c7f0a38c044808a48762de5af57b4bd552f843201027e69fbfd5428721d
                            • Instruction Fuzzy Hash: D0F03C32842A42FBD7415FA4EECCBD6BB39FF01742F402025F612988A1C7749466CF90
                            APIs
                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 008D1DC0
                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 008D1DE1
                            • WSAGetLastError.WSOCK32 ref: 008D1DF2
                            • htons.WSOCK32(?,?,?,?,?), ref: 008D1EDB
                            • inet_ntoa.WSOCK32(?), ref: 008D1E8C
                              • Part of subcall function 008B39E8: _strlen.LIBCMT ref: 008B39F2
                              • Part of subcall function 008D3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,008CEC0C), ref: 008D3240
                            • _strlen.LIBCMT ref: 008D1F35
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                            • String ID:
                            • API String ID: 3203458085-0
                            • Opcode ID: 395541658bd002bdfc8f9cb00dbb526eac48b756f0cdf7975227f4d980d44aff
                            • Instruction ID: 975c9fb1639c0908770a3117f00076e831f7f6633a254a90c71be0f15aa5a5df
                            • Opcode Fuzzy Hash: 395541658bd002bdfc8f9cb00dbb526eac48b756f0cdf7975227f4d980d44aff
                            • Instruction Fuzzy Hash: C3B1A131604340AFC724DF28C885E2A7BA5FF85318F548A5DF4569B3A2DB31ED46CB92
                            APIs
                            • GetClientRect.USER32(?,?), ref: 00855D30
                            • GetWindowRect.USER32(?,?), ref: 00855D71
                            • ScreenToClient.USER32(?,?), ref: 00855D99
                            • GetClientRect.USER32(?,?), ref: 00855ED7
                            • GetWindowRect.USER32(?,?), ref: 00855EF8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Rect$Client$Window$Screen
                            • String ID:
                            • API String ID: 1296646539-0
                            • Opcode ID: c1fa5c23eb0ca68b488adb656bc8d2e029a497aec65af7fe8add8af3bd0050a4
                            • Instruction ID: 96bd5a5517f53fe2bcfc9f09a8a70bc173395d8ce2b502e783211e827b7183a1
                            • Opcode Fuzzy Hash: c1fa5c23eb0ca68b488adb656bc8d2e029a497aec65af7fe8add8af3bd0050a4
                            • Instruction Fuzzy Hash: 65B18B35A0064ADBDF10DFA8C481BEEB7F1FF58311F14941AE8A9D7250DB30AA45CB50
                            APIs
                            • __allrem.LIBCMT ref: 008800BA
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008800D6
                            • __allrem.LIBCMT ref: 008800ED
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088010B
                            • __allrem.LIBCMT ref: 00880122
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00880140
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                            • Instruction ID: 5f551c8842949b68108d10a2c59bee90c028c0fe66aa514914d0df4a67f420cc
                            • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                            • Instruction Fuzzy Hash: 7581E376A00B069BE720BA6DCC45B6A73E8FF51334F24813AF555D6282EF70E9048B91
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,008782D9,008782D9,?,?,?,0088644F,00000001,00000001,8BE85006), ref: 00886258
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0088644F,00000001,00000001,8BE85006,?,?,?), ref: 008862DE
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 008863D8
                            • __freea.LIBCMT ref: 008863E5
                              • Part of subcall function 00883820: RtlAllocateHeap.NTDLL(00000000,?,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6,?,00851129), ref: 00883852
                            • __freea.LIBCMT ref: 008863EE
                            • __freea.LIBCMT ref: 00886413
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                            • String ID:
                            • API String ID: 1414292761-0
                            • Opcode ID: 1cf611ab560fee0eb7c69496a8451687c93670a4d11db9d864c73c3685144272
                            • Instruction ID: 631f9768fd26990142ebe254673453d142544461c576efb66d67cf95ddda7ada
                            • Opcode Fuzzy Hash: 1cf611ab560fee0eb7c69496a8451687c93670a4d11db9d864c73c3685144272
                            • Instruction Fuzzy Hash: 0851DF72A00216ABEB25AF64DC81EAF77AAFB44710F144669FC05DA240FB34DC60C7A0
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DB6AE,?,?), ref: 008DC9B5
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DC9F1
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA68
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DBCCA
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008DBD25
                            • RegCloseKey.ADVAPI32(00000000), ref: 008DBD6A
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 008DBD99
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 008DBDF3
                            • RegCloseKey.ADVAPI32(?), ref: 008DBDFF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                            • String ID:
                            • API String ID: 1120388591-0
                            • Opcode ID: 9c1e5088e4ce75be5bac10378bf32a426721f1136c839ce146baf6840bf7c347
                            • Instruction ID: dedc477546be3262aeb6708cf2f55bcdabcb66d8d6f6b86b8efcd759e0112571
                            • Opcode Fuzzy Hash: 9c1e5088e4ce75be5bac10378bf32a426721f1136c839ce146baf6840bf7c347
                            • Instruction Fuzzy Hash: 04814A30208241EFD714DF24C895E2ABBE5FF84308F158A5DF5958B2A2DB31ED45CB92
                            APIs
                            • VariantInit.OLEAUT32(00000035), ref: 008AF7B9
                            • SysAllocString.OLEAUT32(00000001), ref: 008AF860
                            • VariantCopy.OLEAUT32(008AFA64,00000000), ref: 008AF889
                            • VariantClear.OLEAUT32(008AFA64), ref: 008AF8AD
                            • VariantCopy.OLEAUT32(008AFA64,00000000), ref: 008AF8B1
                            • VariantClear.OLEAUT32(?), ref: 008AF8BB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearCopy$AllocInitString
                            • String ID:
                            • API String ID: 3859894641-0
                            • Opcode ID: 263a297cdc70a9497b6bdefd115c7d4ca0b2b902658fabfebe91658a04a5a214
                            • Instruction ID: 6b0b36eb64afae081201378a0713a03ebb0a5a992fe8b1049dba40406b604f55
                            • Opcode Fuzzy Hash: 263a297cdc70a9497b6bdefd115c7d4ca0b2b902658fabfebe91658a04a5a214
                            • Instruction Fuzzy Hash: 4E51F831500314BBEF20ABA9D895B2AB7A4FF46314F244466FA05DF693DB748C41C797
                            APIs
                              • Part of subcall function 00857620: _wcslen.LIBCMT ref: 00857625
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            • GetOpenFileNameW.COMDLG32(00000058), ref: 008C94E5
                            • _wcslen.LIBCMT ref: 008C9506
                            • _wcslen.LIBCMT ref: 008C952D
                            • GetSaveFileNameW.COMDLG32(00000058), ref: 008C9585
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$FileName$OpenSave
                            • String ID: X
                            • API String ID: 83654149-3081909835
                            • Opcode ID: 3abf767a9dce40c541e4403585eb4709aa7dba066636f11168acd26cba988246
                            • Instruction ID: d158f3d45b59c67ef053e1e52fdd0d6c7e2f9c959108c9c792aeb54349e3624c
                            • Opcode Fuzzy Hash: 3abf767a9dce40c541e4403585eb4709aa7dba066636f11168acd26cba988246
                            • Instruction Fuzzy Hash: 28E15B315083408FC724DF28C885B6AB7E4FF85314F1589ADE999DB2A2EB31DD05CB92
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • BeginPaint.USER32(?,?,?), ref: 00869241
                            • GetWindowRect.USER32(?,?), ref: 008692A5
                            • ScreenToClient.USER32(?,?), ref: 008692C2
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 008692D3
                            • EndPaint.USER32(?,?,?,?,?), ref: 00869321
                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008A71EA
                              • Part of subcall function 00869339: BeginPath.GDI32(00000000), ref: 00869357
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                            • String ID:
                            • API String ID: 3050599898-0
                            • Opcode ID: 35e1a31d51b3b103632dc0a4dbaba365c34035d22683f0fd35fc5ae06a2329ea
                            • Instruction ID: 2251ab9601f60ee7d70bd176bc65bc550a0711213a3e53df8da36c12220d5fba
                            • Opcode Fuzzy Hash: 35e1a31d51b3b103632dc0a4dbaba365c34035d22683f0fd35fc5ae06a2329ea
                            • Instruction Fuzzy Hash: 3041A170508340AFD721DF18DC94FAA7BE8FB56324F040229F9A4C72E1C7309846DB62
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 008C080C
                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 008C0847
                            • EnterCriticalSection.KERNEL32(?), ref: 008C0863
                            • LeaveCriticalSection.KERNEL32(?), ref: 008C08DC
                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008C08F3
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 008C0921
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                            • String ID:
                            • API String ID: 3368777196-0
                            • Opcode ID: c45a237dd178552d35672d858493ad31271d01faded1d99e7ef2c786760a0130
                            • Instruction ID: 71ddf7f1ce1f36b7dbb60b5810c8c13132c0d37485217bf7a0f066bf8a087ca4
                            • Opcode Fuzzy Hash: c45a237dd178552d35672d858493ad31271d01faded1d99e7ef2c786760a0130
                            • Instruction Fuzzy Hash: 0D415871900205EBDF14AF58DC85AAA7B78FF04300F1480A9EE04DE297D731DE65DBA1
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,008AF3AB,00000000,?,?,00000000,?,008A682C,00000004,00000000,00000000), ref: 008E824C
                            • EnableWindow.USER32(00000000,00000000), ref: 008E8272
                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008E82D1
                            • ShowWindow.USER32(00000000,00000004), ref: 008E82E5
                            • EnableWindow.USER32(00000000,00000001), ref: 008E830B
                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 008E832F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: aacdb61a48e4415f01f80c8fbe024567ab8f210e3b5453a1757938d56fff7d1a
                            • Instruction ID: 2053c834d9922e6b8e340a3cbe6ca56d6b470e04d19298ba09232974bcd7a441
                            • Opcode Fuzzy Hash: aacdb61a48e4415f01f80c8fbe024567ab8f210e3b5453a1757938d56fff7d1a
                            • Instruction Fuzzy Hash: A5419634601684EFDB25CF16D895BE87BE1FB1B714F184169EA0C9F272CB32A852CB50
                            APIs
                            • IsWindowVisible.USER32(?), ref: 008B4C95
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 008B4CB2
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 008B4CEA
                            • _wcslen.LIBCMT ref: 008B4D08
                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 008B4D10
                            • _wcsstr.LIBVCRUNTIME ref: 008B4D1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                            • String ID:
                            • API String ID: 72514467-0
                            • Opcode ID: 8b266ff480ffd785cadb628661aa9f7dfff6be8c1fc4eeb44d89abcb15712c9a
                            • Instruction ID: 43643e1c64138d13afc8b3ab3e399b719b4d6229df2a40e132127c8e132e13df
                            • Opcode Fuzzy Hash: 8b266ff480ffd785cadb628661aa9f7dfff6be8c1fc4eeb44d89abcb15712c9a
                            • Instruction Fuzzy Hash: 052129326042447BEB555B39EC4AEBB7FACFF45750F14902DF905CE2A3EA61CC0182A1
                            APIs
                              • Part of subcall function 00853AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00853A97,?,?,00852E7F,?,?,?,00000000), ref: 00853AC2
                            • _wcslen.LIBCMT ref: 008C587B
                            • CoInitialize.OLE32(00000000), ref: 008C5995
                            • CoCreateInstance.OLE32(008EFCF8,00000000,00000001,008EFB68,?), ref: 008C59AE
                            • CoUninitialize.OLE32 ref: 008C59CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 3172280962-24824748
                            • Opcode ID: 45ebf8cad8eed7736685b4f77359f26d244b8e30bb7b25bbe4ae4130ad776caa
                            • Instruction ID: fe7d66b780be044930fb8c3aebe477da84fa6f4ac916ef753832a39631296cd9
                            • Opcode Fuzzy Hash: 45ebf8cad8eed7736685b4f77359f26d244b8e30bb7b25bbe4ae4130ad776caa
                            • Instruction Fuzzy Hash: FBD132756046019FCB14DF29C480A2ABBF1FF89724F14895DF889DB261DB31ED89CB92
                            APIs
                              • Part of subcall function 008B0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008B0FCA
                              • Part of subcall function 008B0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008B0FD6
                              • Part of subcall function 008B0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008B0FE5
                              • Part of subcall function 008B0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008B0FEC
                              • Part of subcall function 008B0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008B1002
                            • GetLengthSid.ADVAPI32(?,00000000,008B1335), ref: 008B17AE
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008B17BA
                            • HeapAlloc.KERNEL32(00000000), ref: 008B17C1
                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 008B17DA
                            • GetProcessHeap.KERNEL32(00000000,00000000,008B1335), ref: 008B17EE
                            • HeapFree.KERNEL32(00000000), ref: 008B17F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                            • String ID:
                            • API String ID: 3008561057-0
                            • Opcode ID: 91360b6c9154365154dcddd669bf1a07179524926ec86b573217d795ff331ed8
                            • Instruction ID: afb7004b2a0faf23096135959dfba0614682e4fbad2eebb6067f23788153f881
                            • Opcode Fuzzy Hash: 91360b6c9154365154dcddd669bf1a07179524926ec86b573217d795ff331ed8
                            • Instruction Fuzzy Hash: 8C11AC32A10605FFDF109FA4CC99BEE7BA9FB42355F504018F851DB214CB35A941CB64
                            APIs
                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008B14FF
                            • OpenProcessToken.ADVAPI32(00000000), ref: 008B1506
                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 008B1515
                            • CloseHandle.KERNEL32(00000004), ref: 008B1520
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008B154F
                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 008B1563
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                            • String ID:
                            • API String ID: 1413079979-0
                            • Opcode ID: 53af5d105716c5ac16f742dae32dc0700f7c007375f9defcbf6a42d33fea0091
                            • Instruction ID: a87dbd1d6e2e381332bbc396cc3f0466f53a1595749f0439c5099137d454f3f6
                            • Opcode Fuzzy Hash: 53af5d105716c5ac16f742dae32dc0700f7c007375f9defcbf6a42d33fea0091
                            • Instruction Fuzzy Hash: 5111297250024DEBDF11CF98DD49BDE7BA9FF48744F044025FA15AA160C3758E61DB60
                            APIs
                            • GetLastError.KERNEL32(?,?,00873379,00872FE5), ref: 00873390
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0087339E
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008733B7
                            • SetLastError.KERNEL32(00000000,?,00873379,00872FE5), ref: 00873409
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: 53b1c99cb32e51cb9a9d116feeb3003dfcb7745ae73fcf976bdbf1cd08125ee1
                            • Instruction ID: b2f4753f3b43f131d76a78ebfadf32f47dde08863a83f45735c658ae6013d7c2
                            • Opcode Fuzzy Hash: 53b1c99cb32e51cb9a9d116feeb3003dfcb7745ae73fcf976bdbf1cd08125ee1
                            • Instruction Fuzzy Hash: 9401287275C311BEAA2527787CC59972A55FB29379330C229F428C42F8EF11CD02B147
                            APIs
                            • GetLastError.KERNEL32(?,?,00885686,00893CD6,?,00000000,?,00885B6A,?,?,?,?,?,0087E6D1,?,00918A48), ref: 00882D78
                            • _free.LIBCMT ref: 00882DAB
                            • _free.LIBCMT ref: 00882DD3
                            • SetLastError.KERNEL32(00000000,?,?,?,?,0087E6D1,?,00918A48,00000010,00854F4A,?,?,00000000,00893CD6), ref: 00882DE0
                            • SetLastError.KERNEL32(00000000,?,?,?,?,0087E6D1,?,00918A48,00000010,00854F4A,?,?,00000000,00893CD6), ref: 00882DEC
                            • _abort.LIBCMT ref: 00882DF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: b34c2046ed04bf922e92a1da8299b57b57fea50d45c47e900734edb362e3ef28
                            • Instruction ID: 3e926847d5b6e8a72b00a04c798b1b18dd41dd70f58536e3a970103689141d30
                            • Opcode Fuzzy Hash: b34c2046ed04bf922e92a1da8299b57b57fea50d45c47e900734edb362e3ef28
                            • Instruction Fuzzy Hash: D1F0C876A4960477C612373CBC06E5B2D59FFC17A5F254518FC25D62D2EF2498025362
                            APIs
                              • Part of subcall function 00869639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00869693
                              • Part of subcall function 00869639: SelectObject.GDI32(?,00000000), ref: 008696A2
                              • Part of subcall function 00869639: BeginPath.GDI32(?), ref: 008696B9
                              • Part of subcall function 00869639: SelectObject.GDI32(?,00000000), ref: 008696E2
                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 008E8A4E
                            • LineTo.GDI32(?,00000003,00000000), ref: 008E8A62
                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 008E8A70
                            • LineTo.GDI32(?,00000000,00000003), ref: 008E8A80
                            • EndPath.GDI32(?), ref: 008E8A90
                            • StrokePath.GDI32(?), ref: 008E8AA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                            • String ID:
                            • API String ID: 43455801-0
                            • Opcode ID: 87925ae93878190f30039c1247c418baa32c948d644ba51a8e5ac578d140ae7a
                            • Instruction ID: 52a91b9c0f949766362ebb5b84995238afaea7913567149837f9cd968daf24bf
                            • Opcode Fuzzy Hash: 87925ae93878190f30039c1247c418baa32c948d644ba51a8e5ac578d140ae7a
                            • Instruction Fuzzy Hash: 84110C7640015CFFDF129F94DC88E9A7F6CFB04394F008021FA199A1A1C7719D56DB60
                            APIs
                            • GetDC.USER32(00000000), ref: 008B5218
                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 008B5229
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008B5230
                            • ReleaseDC.USER32(00000000,00000000), ref: 008B5238
                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 008B524F
                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 008B5261
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CapsDevice$Release
                            • String ID:
                            • API String ID: 1035833867-0
                            • Opcode ID: 5c93d5dd114d76b860f85caaeaefb10c37c9e57f86ab1b75ffb28c174baa9a8b
                            • Instruction ID: 29189bf91e2a17f79ce0f2a886364d481a580eed2774e85308a86dcb8de06512
                            • Opcode Fuzzy Hash: 5c93d5dd114d76b860f85caaeaefb10c37c9e57f86ab1b75ffb28c174baa9a8b
                            • Instruction Fuzzy Hash: 75014475E01754BBEB109BE59C49B5EBF78FB44751F044065FA04EB291D6709801CF60
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00851BF4
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00851BFC
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00851C07
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00851C12
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00851C1A
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00851C22
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: e4b16c3c893a6c9e9de5ad238255ce78cf0f826a5b631a3b8295cb3978fe05eb
                            • Instruction ID: 2c1678a40f46f0d61292c9710779cc0d915d5c66e98a7d83f0f7ecc81233770b
                            • Opcode Fuzzy Hash: e4b16c3c893a6c9e9de5ad238255ce78cf0f826a5b631a3b8295cb3978fe05eb
                            • Instruction Fuzzy Hash: F30144B0902B5ABDE3008F6A8C85A52FFA8FF19354F00411BA15C4BA42C7B5A864CBE5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 008BEB30
                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 008BEB46
                            • GetWindowThreadProcessId.USER32(?,?), ref: 008BEB55
                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BEB64
                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BEB6E
                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008BEB75
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                            • String ID:
                            • API String ID: 839392675-0
                            • Opcode ID: a3be907b002165d99d0f7001c93726dab6290e0affa07e910c6c817c8affe294
                            • Instruction ID: ef95a78326fbc6d250ae78ee89e9e57f296552363289e437725b22b1d09b685e
                            • Opcode Fuzzy Hash: a3be907b002165d99d0f7001c93726dab6290e0affa07e910c6c817c8affe294
                            • Instruction Fuzzy Hash: 8BF05472940198BFE7215B529C4DEEF7E7CFFCAB11F000159FA11D5191D7A05A02C6B5
                            APIs
                            • GetClientRect.USER32(?), ref: 008A7452
                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 008A7469
                            • GetWindowDC.USER32(?), ref: 008A7475
                            • GetPixel.GDI32(00000000,?,?), ref: 008A7484
                            • ReleaseDC.USER32(?,00000000), ref: 008A7496
                            • GetSysColor.USER32(00000005), ref: 008A74B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                            • String ID:
                            • API String ID: 272304278-0
                            • Opcode ID: d62581af6fe86fbaa0b26b512128faa511465c5512c35d0966be52035bdd675b
                            • Instruction ID: bd94a9ff83228ddc95324fc1070ba8db12b54213d8e137aaf82a9e0c76111dc1
                            • Opcode Fuzzy Hash: d62581af6fe86fbaa0b26b512128faa511465c5512c35d0966be52035bdd675b
                            • Instruction Fuzzy Hash: D601AD31800259EFEB505F64DC48BAA7BB6FF08311F110064FA26A70B0CB311E52EF10
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 008B187F
                            • UnloadUserProfile.USERENV(?,?), ref: 008B188B
                            • CloseHandle.KERNEL32(?), ref: 008B1894
                            • CloseHandle.KERNEL32(?), ref: 008B189C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 008B18A5
                            • HeapFree.KERNEL32(00000000), ref: 008B18AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: 972bd196d2e6a76ea37c4454d916bb60d2a9aaf0709e86768766520ad4a378a1
                            • Instruction ID: c9d0461438c8e65c81f69f59572c2f3379193ab253ad9dc385e137e725749bdd
                            • Opcode Fuzzy Hash: 972bd196d2e6a76ea37c4454d916bb60d2a9aaf0709e86768766520ad4a378a1
                            • Instruction Fuzzy Hash: A7E0E536804241BBDB015FA5ED4C90AFF39FF4AB22B108220F62589170CB329422DF50
                            APIs
                              • Part of subcall function 00857620: _wcslen.LIBCMT ref: 00857625
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008BC6EE
                            • _wcslen.LIBCMT ref: 008BC735
                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008BC79C
                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 008BC7CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ItemMenu$Info_wcslen$Default
                            • String ID: 0
                            • API String ID: 1227352736-4108050209
                            • Opcode ID: 3850bfba79e41b110265bff150f3fd4cdb325ddd0c1ab84e78402b488aaf6469
                            • Instruction ID: 4b7d4b5c9e1c665e1cb9be30133a1d6dec4e271f7866737aeafff67bc9250120
                            • Opcode Fuzzy Hash: 3850bfba79e41b110265bff150f3fd4cdb325ddd0c1ab84e78402b488aaf6469
                            • Instruction Fuzzy Hash: 0751DE716043019BD7249F2CD885BAB7BE8FF9A314F040A2DF9A5D72A1DF60D904CB5A
                            APIs
                            • ShellExecuteExW.SHELL32(0000003C), ref: 008DAEA3
                              • Part of subcall function 00857620: _wcslen.LIBCMT ref: 00857625
                            • GetProcessId.KERNEL32(00000000), ref: 008DAF38
                            • CloseHandle.KERNEL32(00000000), ref: 008DAF67
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseExecuteHandleProcessShell_wcslen
                            • String ID: <$@
                            • API String ID: 146682121-1426351568
                            • Opcode ID: 8203467f930844e1922f93ee9fcbb3de359aee6849720a3f7f4a7fb8cabf8de3
                            • Instruction ID: 8359931e6272c3ef631705cf2290ad2da4fd37e848ed5a7c6ffd4a3137eb52bd
                            • Opcode Fuzzy Hash: 8203467f930844e1922f93ee9fcbb3de359aee6849720a3f7f4a7fb8cabf8de3
                            • Instruction Fuzzy Hash: 7E716771A00218DFCB18DF58C484A9EBBF0FF08314F14859AE856AB392CB70ED45CB92
                            APIs
                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 008B7206
                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 008B723C
                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 008B724D
                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008B72CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorMode$AddressCreateInstanceProc
                            • String ID: DllGetClassObject
                            • API String ID: 753597075-1075368562
                            • Opcode ID: 4afc5a67b27f92a585637d9c96affb9ffb83425a31b2a7f39ddce33f52b0ea6b
                            • Instruction ID: 0761a692ac96e9b3e0b19915edaeab94f4a10fbde8ddc2808ff226fa7c220207
                            • Opcode Fuzzy Hash: 4afc5a67b27f92a585637d9c96affb9ffb83425a31b2a7f39ddce33f52b0ea6b
                            • Instruction Fuzzy Hash: 17411E71A04305AFDB15CF54C884ADA7BA9FF85314F1580A9BD06DF30AD7B1DA45CBA0
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008E3E35
                            • IsMenu.USER32(?), ref: 008E3E4A
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008E3E92
                            • DrawMenuBar.USER32 ref: 008E3EA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert
                            • String ID: 0
                            • API String ID: 3076010158-4108050209
                            • Opcode ID: 47453b144df9c9600ad128240a5f9a9dc7104e8f258c6d391000a6a5086c3b40
                            • Instruction ID: dd5add37e9925af76848f4ea0184678fbab21dbc7bcf51f1a678eb6fd7d0ac7d
                            • Opcode Fuzzy Hash: 47453b144df9c9600ad128240a5f9a9dc7104e8f258c6d391000a6a5086c3b40
                            • Instruction Fuzzy Hash: 58418874A0024AEFDB24DF51D888EAABBB9FF4A354F044129E815EB250C330EE41CF50
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008B3CCA
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 008B1E66
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 008B1E79
                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 008B1EA9
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen$ClassName
                            • String ID: ComboBox$ListBox
                            • API String ID: 2081771294-1403004172
                            • Opcode ID: 536f6f28e298695f444e23d7b031b21521a73bda6194d310d80bb77a408faeec
                            • Instruction ID: b939d7cdcdbcd12f51f8c24161ed9bc71c74f79413c650f3e48e03c3be9968bf
                            • Opcode Fuzzy Hash: 536f6f28e298695f444e23d7b031b21521a73bda6194d310d80bb77a408faeec
                            • Instruction Fuzzy Hash: 83210771A00108BADB149BA8DC99CFFBBB9FF55354B504119FC25EB2E1DB34890A8621
                            APIs
                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 008E2F8D
                            • LoadLibraryW.KERNEL32(?), ref: 008E2F94
                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 008E2FA9
                            • DestroyWindow.USER32(?), ref: 008E2FB1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyLibraryLoadWindow
                            • String ID: SysAnimate32
                            • API String ID: 3529120543-1011021900
                            • Opcode ID: af789954ddcf87c216c8369c77a37b7ee4e68db3b4cdb26d329556c641a20afc
                            • Instruction ID: 2ac5dea97a830aa7d2639d35356b8de62c1f88a38f9322ab65c06fc62941b5e3
                            • Opcode Fuzzy Hash: af789954ddcf87c216c8369c77a37b7ee4e68db3b4cdb26d329556c641a20afc
                            • Instruction Fuzzy Hash: 7F21C072604289ABEB205F65DC81FBB77BDFB5A364F100218F950D61A0DB71DC919760
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00874D1E,008828E9,?,00874CBE,008828E9,009188B8,0000000C,00874E15,008828E9,00000002), ref: 00874D8D
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00874DA0
                            • FreeLibrary.KERNEL32(00000000,?,?,?,00874D1E,008828E9,?,00874CBE,008828E9,009188B8,0000000C,00874E15,008828E9,00000002,00000000), ref: 00874DC3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: 355088818968934ddd3dbd2cf28350e68e17e4d521e0f601a82f35a98d0dac30
                            • Instruction ID: 51d8c1a3bea5c974a615795a954a47b79b563cfc88a2e4c4f04f2176b06027fa
                            • Opcode Fuzzy Hash: 355088818968934ddd3dbd2cf28350e68e17e4d521e0f601a82f35a98d0dac30
                            • Instruction Fuzzy Hash: 72F04F34A4021CBFDB119FA4DC89BADBFB5FF44752F0040A8F909E6260DB359941DE91
                            APIs
                            • LoadLibraryA.KERNEL32 ref: 008AD3AD
                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 008AD3BF
                            • FreeLibrary.KERNEL32(00000000), ref: 008AD3E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: GetSystemWow64DirectoryW$X64
                            • API String ID: 145871493-2590602151
                            • Opcode ID: 758d19a1a5acd1f86271739b8ade554c6124371edc8f317db5b67a03d2124ab1
                            • Instruction ID: a0b6a9d7c25412687afa629c04f61ad4012289e5355ede5c17438b61502e6075
                            • Opcode Fuzzy Hash: 758d19a1a5acd1f86271739b8ade554c6124371edc8f317db5b67a03d2124ab1
                            • Instruction Fuzzy Hash: 3EF05531C01F258BFB7167108C88AAE7320FF13B05B518058F603EAE24EB20CC49C6C2
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00854EDD,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E9C
                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00854EAE
                            • FreeLibrary.KERNEL32(00000000,?,?,00854EDD,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854EC0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-3689287502
                            • Opcode ID: b24bbd069ad5ed7d9deeb91cb289297b52c96f4b68bc9e47335d446b76dfba92
                            • Instruction ID: e1f249d04c9565dc2f83a68d7101f277299fe7061d0b783271f6a8dcf725a2c5
                            • Opcode Fuzzy Hash: b24bbd069ad5ed7d9deeb91cb289297b52c96f4b68bc9e47335d446b76dfba92
                            • Instruction Fuzzy Hash: B7E08C36E026225B93221B25AC1AA6B7A68FFC2F77B050115FC04E7200DB64CD4A80A0
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00893CDE,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E62
                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00854E74
                            • FreeLibrary.KERNEL32(00000000,?,?,00893CDE,?,00921418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00854E87
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-1355242751
                            • Opcode ID: 1206c07635a1e0d05ef3e8df528ff1df17c03a1aea7db8eed771bfc06fbd1b8c
                            • Instruction ID: b43ec7e89f903d9ffd41e64367a3d1185de011f4012d8c3a1547271a4b7f2e18
                            • Opcode Fuzzy Hash: 1206c07635a1e0d05ef3e8df528ff1df17c03a1aea7db8eed771bfc06fbd1b8c
                            • Instruction Fuzzy Hash: 0AD0C231E026615747221B256C09D8B3A28FF81F3A3450114BC04E6110CF20CD4281D0
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 008DA427
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 008DA435
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 008DA468
                            • CloseHandle.KERNEL32(?), ref: 008DA63D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$CloseCountersCurrentHandleOpen
                            • String ID:
                            • API String ID: 3488606520-0
                            • Opcode ID: 01af7e21b5f00e203a264dbb71312d03cd1454443aae1ff5e147a7b42a2ee9db
                            • Instruction ID: 7aa107af01aa46d3cccd8b79c9598d2ad934d79a82a37ed53c98397437c34b6f
                            • Opcode Fuzzy Hash: 01af7e21b5f00e203a264dbb71312d03cd1454443aae1ff5e147a7b42a2ee9db
                            • Instruction Fuzzy Hash: 4EA18E716043009FD724DF28D886B2AB7E5FB84714F14895DF95ADB392DBB0EC458B82
                            APIs
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,008F3700), ref: 0088BB91
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0092121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0088BC09
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00921270,000000FF,?,0000003F,00000000,?), ref: 0088BC36
                            • _free.LIBCMT ref: 0088BB7F
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 0088BD4B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                            • String ID:
                            • API String ID: 1286116820-0
                            • Opcode ID: 9cfd8ae6df7ea09ccebf649c4b7707eca97dd5c5476a2bc3e6f929500c4036e1
                            • Instruction ID: 521ad0bdbe7420015e52f83ff42b0a08044ad2a131237f978446498c22b9f4d1
                            • Opcode Fuzzy Hash: 9cfd8ae6df7ea09ccebf649c4b7707eca97dd5c5476a2bc3e6f929500c4036e1
                            • Instruction Fuzzy Hash: 7651EA71904219EFCB24FF699C819AEBBBDFF90320B10426AF564D7291EB309E41DB51
                            APIs
                              • Part of subcall function 008BDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008BCF22,?), ref: 008BDDFD
                              • Part of subcall function 008BDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008BCF22,?), ref: 008BDE16
                              • Part of subcall function 008BE199: GetFileAttributesW.KERNEL32(?,008BCF95), ref: 008BE19A
                            • lstrcmpiW.KERNEL32(?,?), ref: 008BE473
                            • MoveFileW.KERNEL32(?,?), ref: 008BE4AC
                            • _wcslen.LIBCMT ref: 008BE5EB
                            • _wcslen.LIBCMT ref: 008BE603
                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 008BE650
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                            • String ID:
                            • API String ID: 3183298772-0
                            • Opcode ID: 629c46aa9439c50e5c207c523a6603ed2c3385446f86d801f484e08ab9e7dd1b
                            • Instruction ID: 5f25901fcdcf792a6b7998307c193187bf01866d6717b20e820961dd039cd399
                            • Opcode Fuzzy Hash: 629c46aa9439c50e5c207c523a6603ed2c3385446f86d801f484e08ab9e7dd1b
                            • Instruction Fuzzy Hash: 07512FB24087859FC724DBA4D8819DB73ECFF85340F00492EE689D3251EE75A688876B
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008DB6AE,?,?), ref: 008DC9B5
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DC9F1
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA68
                              • Part of subcall function 008DC998: _wcslen.LIBCMT ref: 008DCA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008DBAA5
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008DBB00
                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 008DBB63
                            • RegCloseKey.ADVAPI32(?,?), ref: 008DBBA6
                            • RegCloseKey.ADVAPI32(00000000), ref: 008DBBB3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                            • String ID:
                            • API String ID: 826366716-0
                            • Opcode ID: 11dca31f0c1689b9f1775565558dfafd33e798b4e1f96016ed1249bc7ce39a34
                            • Instruction ID: 51d11da5dd0249066e22849563a4ecb6d6100cc2d96c0220999d91988cb6a2b6
                            • Opcode Fuzzy Hash: 11dca31f0c1689b9f1775565558dfafd33e798b4e1f96016ed1249bc7ce39a34
                            • Instruction Fuzzy Hash: 24615D31208241EFD714DF14C491E2ABBE5FF84318F558A5EF4998B2A2DB31ED45CB92
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 008B8BCD
                            • VariantClear.OLEAUT32 ref: 008B8C3E
                            • VariantClear.OLEAUT32 ref: 008B8C9D
                            • VariantClear.OLEAUT32(?), ref: 008B8D10
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 008B8D3B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$Clear$ChangeInitType
                            • String ID:
                            • API String ID: 4136290138-0
                            • Opcode ID: 7d5afd4d72b4a48ef4593263d87fc4ab82247a7e51c88a8d37f03885590e46e4
                            • Instruction ID: 9732c119b987621c0c22a3a006b28db7f2e045ddd9afd89407867087108cda1d
                            • Opcode Fuzzy Hash: 7d5afd4d72b4a48ef4593263d87fc4ab82247a7e51c88a8d37f03885590e46e4
                            • Instruction Fuzzy Hash: 0E516AB5A00219EFCB10CF68C894AEAB7F8FF89314B15855AE919DB350E730E911CF90
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 008C8BAE
                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 008C8BDA
                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 008C8C32
                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 008C8C57
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 008C8C5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String
                            • String ID:
                            • API String ID: 2832842796-0
                            • Opcode ID: 434c5a540a2b112ba3c84b7f6586accf87062a7087d621fefa0eee5273d6be77
                            • Instruction ID: 09b8e0653a5688b27eeedc5ee8096c49f84392fdd230ab687eee66c8ac590c0f
                            • Opcode Fuzzy Hash: 434c5a540a2b112ba3c84b7f6586accf87062a7087d621fefa0eee5273d6be77
                            • Instruction Fuzzy Hash: 95515835A00218EFCB05DF68C880E6ABBF5FF48314F088458E949AB362DB31ED55CB91
                            APIs
                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 008D8F40
                            • GetProcAddress.KERNEL32(00000000,?), ref: 008D8FD0
                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 008D8FEC
                            • GetProcAddress.KERNEL32(00000000,?), ref: 008D9032
                            • FreeLibrary.KERNEL32(00000000), ref: 008D9052
                              • Part of subcall function 0086F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,008C1043,?,7529E610), ref: 0086F6E6
                              • Part of subcall function 0086F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,008AFA64,00000000,00000000,?,?,008C1043,?,7529E610,?,008AFA64), ref: 0086F70D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                            • String ID:
                            • API String ID: 666041331-0
                            • Opcode ID: 3a2378e2c2918cffd90a978fb36eac224cc68340a9c3cb903bcff6cf375058f4
                            • Instruction ID: bf812e6ec39c03d9c01543e56f33926655e63f2d3ef0aed7649ca72bea40136b
                            • Opcode Fuzzy Hash: 3a2378e2c2918cffd90a978fb36eac224cc68340a9c3cb903bcff6cf375058f4
                            • Instruction Fuzzy Hash: 07514B35600205DFC715DF68C4848ADBBF1FF49324B0581A9E846DB362DB31ED8ACB91
                            APIs
                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 008E6C33
                            • SetWindowLongW.USER32(?,000000EC,?), ref: 008E6C4A
                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 008E6C73
                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,008CAB79,00000000,00000000), ref: 008E6C98
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 008E6CC7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Long$MessageSendShow
                            • String ID:
                            • API String ID: 3688381893-0
                            • Opcode ID: 27dbbe2b7663e8d7f646bf1d193e7c7ac455b2b2d2ce2710f80e384d5a3cd68f
                            • Instruction ID: b6591caaee3e7b7ad57c8cf48d407bf082d1cf0764bc60ea84369ace71263304
                            • Opcode Fuzzy Hash: 27dbbe2b7663e8d7f646bf1d193e7c7ac455b2b2d2ce2710f80e384d5a3cd68f
                            • Instruction Fuzzy Hash: 3F41A435A04184AFD724CF2ACC95FA57BA5FB1B3A0F240268EC95E72A0E371AD61D640
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 99e167960e928caded553f53863afad196ad2a49e9623c549a4730b29e1dbd95
                            • Instruction ID: 70d91636428f5a8579f2eae6c48ae8cf2e8a1fff44d8055a9a434c66002a1fee
                            • Opcode Fuzzy Hash: 99e167960e928caded553f53863afad196ad2a49e9623c549a4730b29e1dbd95
                            • Instruction Fuzzy Hash: 1041E276A006049FCB20EF78C880A5DB7E5FF89314F2685A8E615EB392D731ED01CB81
                            APIs
                            • GetCursorPos.USER32(?), ref: 00869141
                            • ScreenToClient.USER32(00000000,?), ref: 0086915E
                            • GetAsyncKeyState.USER32(00000001), ref: 00869183
                            • GetAsyncKeyState.USER32(00000002), ref: 0086919D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorScreen
                            • String ID:
                            • API String ID: 4210589936-0
                            • Opcode ID: 8e143d975aeba0eba35746e57fa5140e0e15b755013567feb173fc2918edeb42
                            • Instruction ID: 422bd422469c8818a40085cdd30ce1b141ec15010a8e1285701bf5d24a162f2c
                            • Opcode Fuzzy Hash: 8e143d975aeba0eba35746e57fa5140e0e15b755013567feb173fc2918edeb42
                            • Instruction Fuzzy Hash: 39417F31A0860AFBDF059F68CC44BEEB7B8FB06324F208229E465E72D0C7346954DB91
                            APIs
                            • GetInputState.USER32 ref: 008C38CB
                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 008C3922
                            • TranslateMessage.USER32(?), ref: 008C394B
                            • DispatchMessageW.USER32(?), ref: 008C3955
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008C3966
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                            • String ID:
                            • API String ID: 2256411358-0
                            • Opcode ID: f64f0994690a7ec35d68834c8e551803088e5a4a6c4b2d9b46af54ddac1f10bd
                            • Instruction ID: ba41d58e05bc810f935fec1f47b15c532c071d9b62cb5390af21b85cfae52acb
                            • Opcode Fuzzy Hash: f64f0994690a7ec35d68834c8e551803088e5a4a6c4b2d9b46af54ddac1f10bd
                            • Instruction Fuzzy Hash: DF31A6709183869EEB35CB349848FB67BB8FB16304F04856DE462D61A0E3B5D68BDB11
                            APIs
                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 008CCF38
                            • InternetReadFile.WININET(?,00000000,?,?), ref: 008CCF6F
                            • GetLastError.KERNEL32(?,00000000,?,?,?,008CC21E,00000000), ref: 008CCFB4
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,008CC21E,00000000), ref: 008CCFC8
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,008CC21E,00000000), ref: 008CCFF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                            • String ID:
                            • API String ID: 3191363074-0
                            • Opcode ID: 7b17a55ff9d8691fe0e8c017ef7fda66dff5d670c025e582c9e393ce9f0872ca
                            • Instruction ID: e34d8058fbe625789175895665097914e5fbf6926c588ab64d5a0db87c89b401
                            • Opcode Fuzzy Hash: 7b17a55ff9d8691fe0e8c017ef7fda66dff5d670c025e582c9e393ce9f0872ca
                            • Instruction Fuzzy Hash: 67314A71A10209EFDB20DFA9D884EABBBFAFB14354B10442EF51AD6141DB70EE419B60
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 008B1915
                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 008B19C1
                            • Sleep.KERNEL32(00000000,?,?,?), ref: 008B19C9
                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 008B19DA
                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 008B19E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessagePostSleep$RectWindow
                            • String ID:
                            • API String ID: 3382505437-0
                            • Opcode ID: 2bb330604f23c0fc97987c1a7e93e07105abbf03606f625a76d5a52382723294
                            • Instruction ID: 3a7fcb7dd778fa2ed12f38e4e9815e55dea2431fca557554c81d4f4ea34c6d08
                            • Opcode Fuzzy Hash: 2bb330604f23c0fc97987c1a7e93e07105abbf03606f625a76d5a52382723294
                            • Instruction Fuzzy Hash: D6318B71A00259EFCB04CFA8C9ADADE3BB5FB05315F504229F921EB2D1C7709944CB90
                            APIs
                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 008E5745
                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 008E579D
                            • _wcslen.LIBCMT ref: 008E57AF
                            • _wcslen.LIBCMT ref: 008E57BA
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 008E5816
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen
                            • String ID:
                            • API String ID: 763830540-0
                            • Opcode ID: 4e4f853683500c46cf30ce8e90658098f681ad1b9296c83f68dd05a3b01441a1
                            • Instruction ID: 3db3325bc5dd440d2984fd8fcc4fb6e6294c609c7f57db0722951aef85fa4c4c
                            • Opcode Fuzzy Hash: 4e4f853683500c46cf30ce8e90658098f681ad1b9296c83f68dd05a3b01441a1
                            • Instruction Fuzzy Hash: 4D21D2709046989ADB209FA5CC84AEE7BB8FF12328F108216E929EB1D1D770C981CF50
                            APIs
                            • IsWindow.USER32(00000000), ref: 008D0951
                            • GetForegroundWindow.USER32 ref: 008D0968
                            • GetDC.USER32(00000000), ref: 008D09A4
                            • GetPixel.GDI32(00000000,?,00000003), ref: 008D09B0
                            • ReleaseDC.USER32(00000000,00000003), ref: 008D09E8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ForegroundPixelRelease
                            • String ID:
                            • API String ID: 4156661090-0
                            • Opcode ID: a7ec233b649e916c1df0782d2c8c3b1677b3c9eff733e8750157a354f4890f5e
                            • Instruction ID: bacccfb5a6222058fabc7c7fe27223ef823afbc3d2a449962549d3eb56712d14
                            • Opcode Fuzzy Hash: a7ec233b649e916c1df0782d2c8c3b1677b3c9eff733e8750157a354f4890f5e
                            • Instruction Fuzzy Hash: C4216F35A00204AFD704EF69C898AAEBBF5FF44701F04846DE85ADB362DB70AC05CB90
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 0088CDC6
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0088CDE9
                              • Part of subcall function 00883820: RtlAllocateHeap.NTDLL(00000000,?,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6,?,00851129), ref: 00883852
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0088CE0F
                            • _free.LIBCMT ref: 0088CE22
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0088CE31
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: b195030e74f3ca6bf2f3e35239d3f572ac3d5add5cd8ef6a3e411ff9491f67e4
                            • Instruction ID: c897d3629392c4e9dcf4297bad98a71686b67463c8d5212758affe212495ab12
                            • Opcode Fuzzy Hash: b195030e74f3ca6bf2f3e35239d3f572ac3d5add5cd8ef6a3e411ff9491f67e4
                            • Instruction Fuzzy Hash: 77018472A012557F23213ABAAC88D7B7A6DFFC6BA13154129F905D7205EB718D0283B1
                            APIs
                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00869693
                            • SelectObject.GDI32(?,00000000), ref: 008696A2
                            • BeginPath.GDI32(?), ref: 008696B9
                            • SelectObject.GDI32(?,00000000), ref: 008696E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: e2042b0ac112007fe9f40108d6e484322de646e0af6052b803472523c166ccfa
                            • Instruction ID: 4593f377362dc9f0d0db6738c2a85dc3ef60fe1a55bb8b9a00b2aa8f32a76a6a
                            • Opcode Fuzzy Hash: e2042b0ac112007fe9f40108d6e484322de646e0af6052b803472523c166ccfa
                            • Instruction Fuzzy Hash: 8A217F7482A345EBDB219F28FC44BA93BA8FB21355F110216F450E61F0D37058A3EB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 519cb240abfc69f38e198d1c80a400fa842570736b41ff0bd3f252cde9ed7ca6
                            • Instruction ID: 970784dd7439d6e6d2543cd2dadbe4399bff1a3b65f656434945172d97275b5e
                            • Opcode Fuzzy Hash: 519cb240abfc69f38e198d1c80a400fa842570736b41ff0bd3f252cde9ed7ca6
                            • Instruction Fuzzy Hash: 3601B971781619BBE60855199D42FFB735CFB713A8F208020FE18DA742FB64EE1183A5
                            APIs
                            • GetLastError.KERNEL32(?,?,?,0087F2DE,00883863,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6), ref: 00882DFD
                            • _free.LIBCMT ref: 00882E32
                            • _free.LIBCMT ref: 00882E59
                            • SetLastError.KERNEL32(00000000,00851129), ref: 00882E66
                            • SetLastError.KERNEL32(00000000,00851129), ref: 00882E6F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: f261d5089f1f4e0256ebabd1296821ab279c0dd2df2ba2076416a7e33258dde0
                            • Instruction ID: bdd05f50177b6ba11ce45f767416db6b32d874c5c5aeb85ea4a555637848796f
                            • Opcode Fuzzy Hash: f261d5089f1f4e0256ebabd1296821ab279c0dd2df2ba2076416a7e33258dde0
                            • Instruction Fuzzy Hash: C60128326896007BC612773C6C89D2B265DFBC17BAB214028F821E22D3EF34AC018325
                            APIs
                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?,?,008B035E), ref: 008B002B
                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?), ref: 008B0046
                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?), ref: 008B0054
                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?), ref: 008B0064
                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008AFF41,80070057,?,?), ref: 008B0070
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: From$Prog$FreeStringTasklstrcmpi
                            • String ID:
                            • API String ID: 3897988419-0
                            • Opcode ID: 324872c9c0c0c5c685e66f3c1edf0ea0b0efd78689468013d1e18cd463377242
                            • Instruction ID: bcab9e72a32e74bd50e62d8b7b7c904da01433e56cff60573dfbee1e7d9c0a69
                            • Opcode Fuzzy Hash: 324872c9c0c0c5c685e66f3c1edf0ea0b0efd78689468013d1e18cd463377242
                            • Instruction Fuzzy Hash: 6E018F72A00614BFDB115F68DC44BEB7AADFB44791F144124F905D6310D771DD428BA0
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?), ref: 008BE997
                            • QueryPerformanceFrequency.KERNEL32(?), ref: 008BE9A5
                            • Sleep.KERNEL32(00000000), ref: 008BE9AD
                            • QueryPerformanceCounter.KERNEL32(?), ref: 008BE9B7
                            • Sleep.KERNEL32 ref: 008BE9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: 7224b8731ce3f6ea4099301000360409c75c8b67f7554db09dbac37b7822f7ab
                            • Instruction ID: 1ff2586897b1ef6e875d48066a8061723589fa1a1da540b8d299ca0124921887
                            • Opcode Fuzzy Hash: 7224b8731ce3f6ea4099301000360409c75c8b67f7554db09dbac37b7822f7ab
                            • Instruction Fuzzy Hash: 07011331C0162DDBCF00ABE5D899AEDBF78FB09701F000556E902F6241CB30A6598BA2
                            APIs
                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008B1114
                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1120
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B112F
                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008B0B9B,?,?,?), ref: 008B1136
                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008B114D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 842720411-0
                            • Opcode ID: 941dc7c5ab70a92e4bb2d4fbd70cc74644bc27f27641372269552bbfb13b7f4f
                            • Instruction ID: f1d742a30053ea0a2d9e6a78eaae8030ab0eebedc95bae14e76146bc625eea4f
                            • Opcode Fuzzy Hash: 941dc7c5ab70a92e4bb2d4fbd70cc74644bc27f27641372269552bbfb13b7f4f
                            • Instruction Fuzzy Hash: D1011975600205BFDB114FA9DC9DAAA3B6EFF8A3A0B604419FE45DB360DA31DC019A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008B0FCA
                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008B0FD6
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008B0FE5
                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008B0FEC
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008B1002
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 3b012cf76806c904b5b4916336c9d94b8ddcca3ff526cfc7e065ff49f0646feb
                            • Instruction ID: 6581e7dea67ac6f4e6b7d9ed4f86d4dd63806e159965a24449b7f1906df207a9
                            • Opcode Fuzzy Hash: 3b012cf76806c904b5b4916336c9d94b8ddcca3ff526cfc7e065ff49f0646feb
                            • Instruction Fuzzy Hash: 29F04935600745ABDB215FA49C8DF963BADFF8AB62F504415FE45CA261CA70DC428A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008B102A
                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008B1036
                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1045
                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008B104C
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1062
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 09a7306be2a610c3e78445d118344b2c55856eeb3799cd052dab3d1e6738233c
                            • Instruction ID: 5096a6091f745e6ca8a8428f91416e86a1a986c2cde23d090d1236b4aa238ce0
                            • Opcode Fuzzy Hash: 09a7306be2a610c3e78445d118344b2c55856eeb3799cd052dab3d1e6738233c
                            • Instruction Fuzzy Hash: F3F06D35600741EBDB21AFA4EC9DF963BADFF8A761F500414FE45CB350CA70D8428A60
                            APIs
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C0324
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C0331
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C033E
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C034B
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C0358
                            • CloseHandle.KERNEL32(?,?,?,?,008C017D,?,008C32FC,?,00000001,00892592,?), ref: 008C0365
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID:
                            • API String ID: 2962429428-0
                            • Opcode ID: 673b4325d2519fc7d855a1f0b7114e8a9880c0fc81b6f57effc188c78b7f7837
                            • Instruction ID: 45a36a5e715f0f981b6e5c2ecdb57f14dfaa7f9e6300915d9ef4d1718a0a7de9
                            • Opcode Fuzzy Hash: 673b4325d2519fc7d855a1f0b7114e8a9880c0fc81b6f57effc188c78b7f7837
                            • Instruction Fuzzy Hash: D9019C72800B95DFCB30AF66D880912FBF9FE602553158A3ED19692A31C3B1A959CE80
                            APIs
                            • _free.LIBCMT ref: 0088D752
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 0088D764
                            • _free.LIBCMT ref: 0088D776
                            • _free.LIBCMT ref: 0088D788
                            • _free.LIBCMT ref: 0088D79A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 03cec2044083d06d180a446690b1b4958fd0ec11e47b9ef254a61ade03a4ca08
                            • Instruction ID: ab16ad33131b26abd1f7c6830d091faa86a74b1d2fb09a150f15efb466f87861
                            • Opcode Fuzzy Hash: 03cec2044083d06d180a446690b1b4958fd0ec11e47b9ef254a61ade03a4ca08
                            • Instruction Fuzzy Hash: 93F01D72699304AB8625FB68FDC6D5A7BEDFB44710BA54805F048E7582CB34FC808B65
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 008B5C58
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 008B5C6F
                            • MessageBeep.USER32(00000000), ref: 008B5C87
                            • KillTimer.USER32(?,0000040A), ref: 008B5CA3
                            • EndDialog.USER32(?,00000001), ref: 008B5CBD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: 7e8248b2e9e038d06ef12cb636518a19f9242c8fc1a3cb26e58ec71e25fbf0dd
                            • Instruction ID: 38d947493ab9ef47ea72f42ff90ceca0cfba956406d01ff598c122d11f42e708
                            • Opcode Fuzzy Hash: 7e8248b2e9e038d06ef12cb636518a19f9242c8fc1a3cb26e58ec71e25fbf0dd
                            • Instruction Fuzzy Hash: B6018130900B44ABEB205B50DD9EFE67BB9FB10B06F00055DA583E51E1DBF4A9898A91
                            APIs
                            • _free.LIBCMT ref: 008822BE
                              • Part of subcall function 008829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000), ref: 008829DE
                              • Part of subcall function 008829C8: GetLastError.KERNEL32(00000000,?,0088D7D1,00000000,00000000,00000000,00000000,?,0088D7F8,00000000,00000007,00000000,?,0088DBF5,00000000,00000000), ref: 008829F0
                            • _free.LIBCMT ref: 008822D0
                            • _free.LIBCMT ref: 008822E3
                            • _free.LIBCMT ref: 008822F4
                            • _free.LIBCMT ref: 00882305
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 593841d8e1cb6482f5bfdcfbb795fdd3378a41b34482a857182bb9a3e224a12c
                            • Instruction ID: 671b23192e26c05b3bf19dfce41165521530d4f21293b17ff4005f56a2308f8b
                            • Opcode Fuzzy Hash: 593841d8e1cb6482f5bfdcfbb795fdd3378a41b34482a857182bb9a3e224a12c
                            • Instruction Fuzzy Hash: CCF05EB09A82208BC632BF58BD41D883FA4F72C761702054AF420D22B2C7351863FFE5
                            APIs
                            • EndPath.GDI32(?), ref: 008695D4
                            • StrokeAndFillPath.GDI32(?,?,008A71F7,00000000,?,?,?), ref: 008695F0
                            • SelectObject.GDI32(?,00000000), ref: 00869603
                            • DeleteObject.GDI32 ref: 00869616
                            • StrokePath.GDI32(?), ref: 00869631
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: 382b9afca4ec2c5ce7a086c7241a7c2e078a8f36b7d52e876dea33d93c2c6e90
                            • Instruction ID: 538e94503a6225e456b8a87303a537c4a9f8c583f748ecb5e1a22bc5574175fe
                            • Opcode Fuzzy Hash: 382b9afca4ec2c5ce7a086c7241a7c2e078a8f36b7d52e876dea33d93c2c6e90
                            • Instruction Fuzzy Hash: BEF0C939419788EBDB265F65ED5DB643B65FB21362F048214F465990F0C73089A7EF20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __freea$_free
                            • String ID: a/p$am/pm
                            • API String ID: 3432400110-3206640213
                            • Opcode ID: ef34d32d19fcdc4b768b1f87e7962eb0a2ca3809856967e00b192dd38342a16d
                            • Instruction ID: 604a94f4e10a4d080208e8aa2151913141b2a9c72d835c657c2450e4bd08c384
                            • Opcode Fuzzy Hash: ef34d32d19fcdc4b768b1f87e7962eb0a2ca3809856967e00b192dd38342a16d
                            • Instruction Fuzzy Hash: 73D1E23590020ACACF24AF68C84DAFAB7B9FF06704F244169E505DBB51DB799D82CB51
                            APIs
                              • Part of subcall function 00870242: EnterCriticalSection.KERNEL32(0092070C,00921884,?,?,0086198B,00922518,?,?,?,008512F9,00000000), ref: 0087024D
                              • Part of subcall function 00870242: LeaveCriticalSection.KERNEL32(0092070C,?,0086198B,00922518,?,?,?,008512F9,00000000), ref: 0087028A
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008700A3: __onexit.LIBCMT ref: 008700A9
                            • __Init_thread_footer.LIBCMT ref: 008D7BFB
                              • Part of subcall function 008701F8: EnterCriticalSection.KERNEL32(0092070C,?,?,00868747,00922514), ref: 00870202
                              • Part of subcall function 008701F8: LeaveCriticalSection.KERNEL32(0092070C,?,00868747,00922514), ref: 00870235
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                            • String ID: 5$G$Variable must be of type 'Object'.
                            • API String ID: 535116098-3733170431
                            • Opcode ID: ea25d7e1f1a2b5e0771a812a7d893d3a17092c40503b57b0e106351d66892939
                            • Instruction ID: 02ba30c9a8abfb6b5b34f5465962b83171f0ef68d0329743630a8e012fa98418
                            • Opcode Fuzzy Hash: ea25d7e1f1a2b5e0771a812a7d893d3a17092c40503b57b0e106351d66892939
                            • Instruction Fuzzy Hash: BD915B70A04209AFCB14EF58D891DADB7B2FF45304F10815AF846EB395EB71AE45CB52
                            APIs
                              • Part of subcall function 008BB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008B21D0,?,?,00000034,00000800,?,00000034), ref: 008BB42D
                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 008B2760
                              • Part of subcall function 008BB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008B21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 008BB3F8
                              • Part of subcall function 008BB32A: GetWindowThreadProcessId.USER32(?,?), ref: 008BB355
                              • Part of subcall function 008BB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,008B2194,00000034,?,?,00001004,00000000,00000000), ref: 008BB365
                              • Part of subcall function 008BB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,008B2194,00000034,?,?,00001004,00000000,00000000), ref: 008BB37B
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008B27CD
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008B281A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                            • String ID: @
                            • API String ID: 4150878124-2766056989
                            • Opcode ID: adbf88c97f7103f0eb943f44e105faa0e59ff6d62a7c3829701a95441b92c5f1
                            • Instruction ID: 1b3d4e78224e4f8a00faf1e7ed53694b70458f14f3e4577e99659864ec55eeb0
                            • Opcode Fuzzy Hash: adbf88c97f7103f0eb943f44e105faa0e59ff6d62a7c3829701a95441b92c5f1
                            • Instruction Fuzzy Hash: F041FE76900218AFDB10DFA8CD85ADEBBB8FF09700F104059FA55B7291DB716E45CB61
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\shipping advice.exe,00000104), ref: 00881769
                            • _free.LIBCMT ref: 00881834
                            • _free.LIBCMT ref: 0088183E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: C:\Users\user\Desktop\shipping advice.exe
                            • API String ID: 2506810119-3906570568
                            • Opcode ID: 1e286e619fc8ae567459aed6996d9b524daa0cfae185b05b85a98e4cf33ccd3d
                            • Instruction ID: 5635aaf7c8a9a83ac5787fe7aacb0e0eaf65f728dc384fe1299414500144156e
                            • Opcode Fuzzy Hash: 1e286e619fc8ae567459aed6996d9b524daa0cfae185b05b85a98e4cf33ccd3d
                            • Instruction Fuzzy Hash: 34318E71A04218EBDF21FB999C89D9EBBFCFB95710B1041AAF804D7211DA708E42CB91
                            APIs
                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 008BC306
                            • DeleteMenu.USER32(?,00000007,00000000), ref: 008BC34C
                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00921990,00EF5900), ref: 008BC395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem
                            • String ID: 0
                            • API String ID: 135850232-4108050209
                            • Opcode ID: b1e6a79c97b0ed776b23ec1d9e26e9a036ee2239b5ed50907169dc9aaf0a7c92
                            • Instruction ID: c3ffdbfffffa9f70c58aae53d75a9e0c6e734b98518d7c7aa20c99752361ef92
                            • Opcode Fuzzy Hash: b1e6a79c97b0ed776b23ec1d9e26e9a036ee2239b5ed50907169dc9aaf0a7c92
                            • Instruction Fuzzy Hash: FA416B312043419FD720DF29D885B9BBBE4FB89324F548A1EE9A5D7391D770A904CB62
                            APIs
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,008ECC08,00000000,?,?,?,?), ref: 008E44AA
                            • GetWindowLongW.USER32 ref: 008E44C7
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E44D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID: SysTreeView32
                            • API String ID: 847901565-1698111956
                            • Opcode ID: 24d60d8f44ff96aef4608927a8bcd909a877369a3710eb9cec834bc2d2702216
                            • Instruction ID: 60bc14742e32f8e455f1b6103a0bc16e8748f258c3d40fc2495922d3860b4868
                            • Opcode Fuzzy Hash: 24d60d8f44ff96aef4608927a8bcd909a877369a3710eb9cec834bc2d2702216
                            • Instruction Fuzzy Hash: AC319C31210685ABDB208E39DC85BEA7BA9FB0A338F205315F979E21E0D770AC519750
                            APIs
                              • Part of subcall function 008D335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,008D3077,?,?), ref: 008D3378
                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008D307A
                            • _wcslen.LIBCMT ref: 008D309B
                            • htons.WSOCK32(00000000,?,?,00000000), ref: 008D3106
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 946324512-2422070025
                            • Opcode ID: 203bb9cb23ca23fd2a67d09a7a2919e0dd8bd72f9ab2418bd91c1e36e535d0f6
                            • Instruction ID: 5ba215529f4d1a0717161c2eccb0d37de1352ec7bb35c6529e7a47e82bdf7228
                            • Opcode Fuzzy Hash: 203bb9cb23ca23fd2a67d09a7a2919e0dd8bd72f9ab2418bd91c1e36e535d0f6
                            • Instruction Fuzzy Hash: C031D539600206DFCB10DF68C585EA977E0FF14318F24826AE915DB392DB71DE45C762
                            APIs
                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 008E4705
                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 008E4713
                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 008E471A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyWindow
                            • String ID: msctls_updown32
                            • API String ID: 4014797782-2298589950
                            • Opcode ID: 878fb27e69ab35a9a13264bcee0616089b3ca86c06d9c9f230a3c6bbee14f75c
                            • Instruction ID: e85d6610fedb600ec0c684276d55b7e15933390f13dd6442ecc0bd403d90dee5
                            • Opcode Fuzzy Hash: 878fb27e69ab35a9a13264bcee0616089b3ca86c06d9c9f230a3c6bbee14f75c
                            • Instruction Fuzzy Hash: 00216DB5600248AFDB10DF69DCC1DA737ADFB5B364B040049F905DB261CB30EC52DAA1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 176396367-2734436370
                            • Opcode ID: 57edde0e172e56dbede429e32f7581538f9f7cb21d67c2a79a2335a02db34735
                            • Instruction ID: 5f27fe88e2b506c78e572b6a0907887cfa96640ed0946682ec1fee9fd7770b77
                            • Opcode Fuzzy Hash: 57edde0e172e56dbede429e32f7581538f9f7cb21d67c2a79a2335a02db34735
                            • Instruction Fuzzy Hash: 28213832144114A6C331AA299C02FFB73D8FFA2314F108026FBD9DB242EB55ED45C396
                            APIs
                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 008E3840
                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 008E3850
                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 008E3876
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend$MoveWindow
                            • String ID: Listbox
                            • API String ID: 3315199576-2633736733
                            • Opcode ID: 5b9480b04785563286f7d3cc8b74772791b09d9d0f11c2c3027e8ab7d0b29076
                            • Instruction ID: 56de9ab50c09d0d7ec40acc4c26c8bbaf780019025d35a853997fa21859d2980
                            • Opcode Fuzzy Hash: 5b9480b04785563286f7d3cc8b74772791b09d9d0f11c2c3027e8ab7d0b29076
                            • Instruction Fuzzy Hash: 01218E72610258BBEB218F56CC89EAB3B6AFF8A764F108124F914DB190C671DD5287A0
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 008C4A08
                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 008C4A5C
                            • SetErrorMode.KERNEL32(00000000,?,?,008ECC08), ref: 008C4AD0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume
                            • String ID: %lu
                            • API String ID: 2507767853-685833217
                            • Opcode ID: 759fa9ee847b88a771572005b3d01eaec911e2a8e475dd2f2c2a2139f90c66ea
                            • Instruction ID: 723be9871aa5b239c2872b410376d8c10193cad6c7eb68ad0913e8e7057999b4
                            • Opcode Fuzzy Hash: 759fa9ee847b88a771572005b3d01eaec911e2a8e475dd2f2c2a2139f90c66ea
                            • Instruction Fuzzy Hash: D1312F75A00119AFDB10DF58C885EAA77F8FF05308F1480A9E905DB252D771ED46CB61
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 008E424F
                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 008E4264
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 008E4271
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: 1c0395cdc881ab7efde0594c97a4ed51c87366796460c1ce363fab0d67e4163e
                            • Instruction ID: ef49ddc43e7b3a38dabc07453a1593c207801ae13f13e0c1fb3fcfbdb08ff4ca
                            • Opcode Fuzzy Hash: 1c0395cdc881ab7efde0594c97a4ed51c87366796460c1ce363fab0d67e4163e
                            • Instruction Fuzzy Hash: 1E11C631240288BEEF205F69CC46FAB7BACFF96B64F110524FA59E60A0D671DC619B10
                            APIs
                              • Part of subcall function 00856B57: _wcslen.LIBCMT ref: 00856B6A
                              • Part of subcall function 008B2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008B2DC5
                              • Part of subcall function 008B2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B2DD6
                              • Part of subcall function 008B2DA7: GetCurrentThreadId.KERNEL32 ref: 008B2DDD
                              • Part of subcall function 008B2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008B2DE4
                            • GetFocus.USER32 ref: 008B2F78
                              • Part of subcall function 008B2DEE: GetParent.USER32(00000000), ref: 008B2DF9
                            • GetClassNameW.USER32(?,?,00000100), ref: 008B2FC3
                            • EnumChildWindows.USER32(?,008B303B), ref: 008B2FEB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                            • String ID: %s%d
                            • API String ID: 1272988791-1110647743
                            • Opcode ID: 691f27d8042c4e5ed487a130d1b4b83549d5e3d580ad069a62c357865256be7d
                            • Instruction ID: e9c9d02a5860daec09a8bfb4b648dcf5070a5f82d60ea20dee43f4455ed15eb5
                            • Opcode Fuzzy Hash: 691f27d8042c4e5ed487a130d1b4b83549d5e3d580ad069a62c357865256be7d
                            • Instruction Fuzzy Hash: 8B11D2716002096BCF007F688CC6EEE376AFF95315F044079BD09DB252EE34994A8B61
                            APIs
                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008E58C1
                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008E58EE
                            • DrawMenuBar.USER32(?), ref: 008E58FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Menu$InfoItem$Draw
                            • String ID: 0
                            • API String ID: 3227129158-4108050209
                            • Opcode ID: 9e7e0246b3350be02298e21531972e5f37a8e749497544a69f4fa456af1ed474
                            • Instruction ID: 66a870e3e7681c7cb7d41d550bc75cc677316ff9155ea6a2505e0033fecefee1
                            • Opcode Fuzzy Hash: 9e7e0246b3350be02298e21531972e5f37a8e749497544a69f4fa456af1ed474
                            • Instruction Fuzzy Hash: A3015E31500258EEDB119F16EC44BAEBFB4FB46368F108099E949DA152DB308A94DF21
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1ba90b045d2a4afd4f50803c0be18960972dcb9ee6dbdf5d9a9e96d3ceabde8d
                            • Instruction ID: 4e2b5e6445165ceb007008dd3f82b1bf97336a453a43ca483e05d9b412d8e1ec
                            • Opcode Fuzzy Hash: 1ba90b045d2a4afd4f50803c0be18960972dcb9ee6dbdf5d9a9e96d3ceabde8d
                            • Instruction Fuzzy Hash: EAC12875A0021AAFDB15CFA8C898AAEB7B5FF48704F208598E505EB351D731EE45CF90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction ID: 7184b71edd25d2106d224fd628bddaecf2850ea796a7c47667b26dfd891e6f9d
                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction Fuzzy Hash: B2A15676E047879FDB21EF18C8917AEBBE4FF61350F18416DE685DB282C6388981C791
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Variant$ClearInitInitializeUninitialize
                            • String ID:
                            • API String ID: 1998397398-0
                            • Opcode ID: c1700926737d5ddd1a4e58452cf448f9bc4aaff21e996bec8625c4cec19e4d60
                            • Instruction ID: e348e0e0da4672f170b40519fea63e055c76041684921ccdc630b608401e2412
                            • Opcode Fuzzy Hash: c1700926737d5ddd1a4e58452cf448f9bc4aaff21e996bec8625c4cec19e4d60
                            • Instruction Fuzzy Hash: 2CA137756047009FCB10DF28D485A2AB7E5FF88755F04895AF98ADB362DB30EE05CB92
                            APIs
                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,008EFC08,?), ref: 008B05F0
                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,008EFC08,?), ref: 008B0608
                            • CLSIDFromProgID.OLE32(?,?,00000000,008ECC40,000000FF,?,00000000,00000800,00000000,?,008EFC08,?), ref: 008B062D
                            • _memcmp.LIBVCRUNTIME ref: 008B064E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FromProg$FreeTask_memcmp
                            • String ID:
                            • API String ID: 314563124-0
                            • Opcode ID: aa3ce17bd7fad4023a236025b7e59176f91b64e6fc3ca845c418340034beff04
                            • Instruction ID: 0977b0c2aa153922e7b03bc8d763db5e20bc712dfbb00db143b8f7b33d640ac1
                            • Opcode Fuzzy Hash: aa3ce17bd7fad4023a236025b7e59176f91b64e6fc3ca845c418340034beff04
                            • Instruction Fuzzy Hash: BF81D675A00209EFCB04DF98C984EEEB7B9FF89315B204558E516EB250DB71AE06CF60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 7ee76b156ff04801eaa80a0622fa8b6fc6875a550f872a15e9848a9b140ec93e
                            • Instruction ID: 9dfb2bcda4ff12a5ab7184897beae1129b2ea8b8d2c627fde8f9ef9ac4b353d1
                            • Opcode Fuzzy Hash: 7ee76b156ff04801eaa80a0622fa8b6fc6875a550f872a15e9848a9b140ec93e
                            • Instruction Fuzzy Hash: 57416D31A08106ABDF217BFD8C8DABE3AA6FF45370F2C4225F419D6293E67488415767
                            APIs
                            • GetWindowRect.USER32(00EFE450,?), ref: 008E62E2
                            • ScreenToClient.USER32(?,?), ref: 008E6315
                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 008E6382
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: 9057aa74a4c0c7f4dc30afca3513e93946dd128080951805a02ff19e23359374
                            • Instruction ID: 5455e658cd7a7c209f72a6e056275637364b6609ef916bb0b60cd26080ef0426
                            • Opcode Fuzzy Hash: 9057aa74a4c0c7f4dc30afca3513e93946dd128080951805a02ff19e23359374
                            • Instruction Fuzzy Hash: E3512D74900249EFCF14DF59D8809AE7BB6FB663A4F108159F915DB2A0E730ED91CB50
                            APIs
                            • socket.WSOCK32(00000002,00000002,00000011), ref: 008D1AFD
                            • WSAGetLastError.WSOCK32 ref: 008D1B0B
                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 008D1B8A
                            • WSAGetLastError.WSOCK32 ref: 008D1B94
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorLast$socket
                            • String ID:
                            • API String ID: 1881357543-0
                            • Opcode ID: 64be82a7337f3176e2d2e75071bff8152fc861230ed6adffe8c886d6f7d6006d
                            • Instruction ID: 1300ca8581f7316afa27d83025c266c8e04022054770e92d35a2178dd4aa7345
                            • Opcode Fuzzy Hash: 64be82a7337f3176e2d2e75071bff8152fc861230ed6adffe8c886d6f7d6006d
                            • Instruction Fuzzy Hash: 58416034640200AFEB20AF28C886F2A77A5FF44718F548559F955DF392D672ED418B91
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 97a4038549f843e87b643af207fbedca922c488f0ebfc29077cc0d8715f0f696
                            • Instruction ID: c39f8443a74f67f786195dc15e403085f02fbaff86d3227362911abce7a0cd2c
                            • Opcode Fuzzy Hash: 97a4038549f843e87b643af207fbedca922c488f0ebfc29077cc0d8715f0f696
                            • Instruction Fuzzy Hash: 4F410675A00708AFD724BF7CCC42B6EBBA9FBC8710F10852AF546DB292D771A9018791
                            APIs
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 008C5783
                            • GetLastError.KERNEL32(?,00000000), ref: 008C57A9
                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008C57CE
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008C57FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: 114d875150a4e871d9ca29eda2ac267d30e80c870d6c5b35fe9404b3dc51fddc
                            • Instruction ID: 1dc6258fe9975e2584c12809b6ba33917ea0b823819dd404f3f51218aae1aa94
                            • Opcode Fuzzy Hash: 114d875150a4e871d9ca29eda2ac267d30e80c870d6c5b35fe9404b3dc51fddc
                            • Instruction Fuzzy Hash: 8741F835600610DFCB11DF19C444A5ABBE1FF89321B19C498ED4A9B362DB30FD45CB92
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00876D71,00000000,00000000,008782D9,?,008782D9,?,00000001,00876D71,8BE85006,00000001,008782D9,008782D9), ref: 0088D910
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0088D999
                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0088D9AB
                            • __freea.LIBCMT ref: 0088D9B4
                              • Part of subcall function 00883820: RtlAllocateHeap.NTDLL(00000000,?,00921444,?,0086FDF5,?,?,0085A976,00000010,00921440,008513FC,?,008513C6,?,00851129), ref: 00883852
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                            • String ID:
                            • API String ID: 2652629310-0
                            • Opcode ID: 89a3dc5862d47be5ceddd70b046d0b6d7d5879634b8ff240b4e36df12e331c1f
                            • Instruction ID: 790d515a719136be9e3804c07f7ef9538451a2b71eca18c48ddbb8e6ae11234d
                            • Opcode Fuzzy Hash: 89a3dc5862d47be5ceddd70b046d0b6d7d5879634b8ff240b4e36df12e331c1f
                            • Instruction Fuzzy Hash: 9431BE72A0021AABDF25AF69DC85EAE7BA5FB41710F054168FC08DB290EB35CD51CB91
                            APIs
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 008E5352
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E5375
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008E5382
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008E53A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LongWindow$InvalidateMessageRectSend
                            • String ID:
                            • API String ID: 3340791633-0
                            • Opcode ID: e2a912ffdef1ce73ac39918a7eef0d0fafcd43fbcd257970e377f621de9075ec
                            • Instruction ID: a02190f1c67056ce94fc09bc9247cb15ed188410efd0e5b61f9d66d62181ea57
                            • Opcode Fuzzy Hash: e2a912ffdef1ce73ac39918a7eef0d0fafcd43fbcd257970e377f621de9075ec
                            • Instruction Fuzzy Hash: 1C310434A55A8CEFEB309B16CC45BE93766FB07398F584001FA10D63E1C7B09D809B42
                            APIs
                            • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 008BABF1
                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 008BAC0D
                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 008BAC74
                            • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 008BACC6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: 8660a462e602994edcc5c384caf5dfbf6d445ebdc98828c0e7a59223fd71df80
                            • Instruction ID: 49b2399f27e035d7154c74e7b8d840a93ddc704a341e14bf0577c52880a97414
                            • Opcode Fuzzy Hash: 8660a462e602994edcc5c384caf5dfbf6d445ebdc98828c0e7a59223fd71df80
                            • Instruction Fuzzy Hash: BE311430A00258AFEF398B68C8657FE7FA5FB89310F04421AE481D63D1D374898587A2
                            APIs
                            • ClientToScreen.USER32(?,?), ref: 008E769A
                            • GetWindowRect.USER32(?,?), ref: 008E7710
                            • PtInRect.USER32(?,?,008E8B89), ref: 008E7720
                            • MessageBeep.USER32(00000000), ref: 008E778C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: 4e831064c016f1c2831b70bf3ab274852059bb574f81217d0c9a2a384265b980
                            • Instruction ID: 342e7d3a257fd9b62e7ce280059b217a9e6e69a48e657112e1e579cde4d2e6e5
                            • Opcode Fuzzy Hash: 4e831064c016f1c2831b70bf3ab274852059bb574f81217d0c9a2a384265b980
                            • Instruction Fuzzy Hash: D4418B38A09294EFDB11CF5ADC94EA9B7F5FB5A314F1540A8E914DB261C730E982CF90
                            APIs
                            • GetForegroundWindow.USER32 ref: 008E16EB
                              • Part of subcall function 008B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008B3A57
                              • Part of subcall function 008B3A3D: GetCurrentThreadId.KERNEL32 ref: 008B3A5E
                              • Part of subcall function 008B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008B25B3), ref: 008B3A65
                            • GetCaretPos.USER32(?), ref: 008E16FF
                            • ClientToScreen.USER32(00000000,?), ref: 008E174C
                            • GetForegroundWindow.USER32 ref: 008E1752
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: 6f69500e3fa35cbc2df4b86572cdf274556f32603e7a153c27450181db811247
                            • Instruction ID: 64930c594db9472025a12b5e63be38c3894425062b8e4facf54de0a68781a818
                            • Opcode Fuzzy Hash: 6f69500e3fa35cbc2df4b86572cdf274556f32603e7a153c27450181db811247
                            • Instruction Fuzzy Hash: E8313071D00249AFCB00EFAAC885CEEB7F9FF49304B508069E415E7251EA319E45CFA1
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 008BD501
                            • Process32FirstW.KERNEL32(00000000,?), ref: 008BD50F
                            • Process32NextW.KERNEL32(00000000,?), ref: 008BD52F
                            • CloseHandle.KERNEL32(00000000), ref: 008BD5DC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                            • String ID:
                            • API String ID: 420147892-0
                            • Opcode ID: e8a2c864d1bbe5fc79ec6ed9e6db954ba68588f913a0cd7000d61c80cea9946e
                            • Instruction ID: c4d486b6438b7f7d27cb95f925dcdddd3a17e5ad3f690480ffe88566046f5a9f
                            • Opcode Fuzzy Hash: e8a2c864d1bbe5fc79ec6ed9e6db954ba68588f913a0cd7000d61c80cea9946e
                            • Instruction Fuzzy Hash: A5317071108340AFD314EF54C881AAFBBE8FF99354F54092DF981C62A1EB719949CB93
                            APIs
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            • GetCursorPos.USER32(?), ref: 008E9001
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,008A7711,?,?,?,?,?), ref: 008E9016
                            • GetCursorPos.USER32(?), ref: 008E905E
                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,008A7711,?,?,?), ref: 008E9094
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                            • String ID:
                            • API String ID: 2864067406-0
                            • Opcode ID: a9b56d9596b6bf8aabe46319aba05aa3ebdf535c138146f36a8f2addf8e72c2a
                            • Instruction ID: ffbef91d5c84ff571b8240ff010d0e11089428e2f4b4f97302ea2e49ceaa932b
                            • Opcode Fuzzy Hash: a9b56d9596b6bf8aabe46319aba05aa3ebdf535c138146f36a8f2addf8e72c2a
                            • Instruction Fuzzy Hash: 3421EF36600558FFCB258F95C898EEA3BF9FB8A320F400055F9458B2A1C3719A91EB60
                            APIs
                            • GetFileAttributesW.KERNEL32(?,008ECB68), ref: 008BD2FB
                            • GetLastError.KERNEL32 ref: 008BD30A
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 008BD319
                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,008ECB68), ref: 008BD376
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateDirectory$AttributesErrorFileLast
                            • String ID:
                            • API String ID: 2267087916-0
                            • Opcode ID: a3e0cd17925359d32e10332e0f3ee901e5325875d34705de2fc72726937626a2
                            • Instruction ID: 41567873323bccd561bbeb39b5cf508734cf36ea22b820ffc471233cef61fdfa
                            • Opcode Fuzzy Hash: a3e0cd17925359d32e10332e0f3ee901e5325875d34705de2fc72726937626a2
                            • Instruction Fuzzy Hash: 9A213070905301EF8710DF28C8814AA77E4FE5A765F504A1DF8A9C73A2F731994ACB93
                            APIs
                              • Part of subcall function 008B1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008B102A
                              • Part of subcall function 008B1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008B1036
                              • Part of subcall function 008B1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1045
                              • Part of subcall function 008B1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008B104C
                              • Part of subcall function 008B1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008B1062
                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008B15BE
                            • _memcmp.LIBVCRUNTIME ref: 008B15E1
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B1617
                            • HeapFree.KERNEL32(00000000), ref: 008B161E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                            • String ID:
                            • API String ID: 1592001646-0
                            • Opcode ID: f8795025a62bfd1640d5df4dfb0410772c7fa3afbf9bc843dda01a6cf2a73e28
                            • Instruction ID: 921ad3b648adfb72947e2dc1dba4edc1a466fbc20881b9af891120bb6aa2e609
                            • Opcode Fuzzy Hash: f8795025a62bfd1640d5df4dfb0410772c7fa3afbf9bc843dda01a6cf2a73e28
                            • Instruction Fuzzy Hash: 64215731E00108ABDF10DFA4C959BEEB7B8FF55344F484459E441EB241E730AA05CBA0
                            APIs
                            • GetWindowLongW.USER32(?,000000EC), ref: 008E280A
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008E2824
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008E2832
                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 008E2840
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Long$AttributesLayered
                            • String ID:
                            • API String ID: 2169480361-0
                            • Opcode ID: 25efb764088d93bd45077449aec0ecd2628459ea4887c1a8f4eaaf6dca4c0c47
                            • Instruction ID: 0917d6dd8e0e2ae7e4d569de43e12525eb8640f12f4fcf8bffc5350606163a72
                            • Opcode Fuzzy Hash: 25efb764088d93bd45077449aec0ecd2628459ea4887c1a8f4eaaf6dca4c0c47
                            • Instruction Fuzzy Hash: 7521D6316041A5AFD7149B25CC45F6A7799FF46324F148158F826CB6E2CB71FC42C791
                            APIs
                              • Part of subcall function 008B8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,008B790A,?,000000FF,?,008B8754,00000000,?,0000001C,?,?), ref: 008B8D8C
                              • Part of subcall function 008B8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 008B8DB2
                              • Part of subcall function 008B8D7D: lstrcmpiW.KERNEL32(00000000,?,008B790A,?,000000FF,?,008B8754,00000000,?,0000001C,?,?), ref: 008B8DE3
                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,008B8754,00000000,?,0000001C,?,?,00000000), ref: 008B7923
                            • lstrcpyW.KERNEL32(00000000,?), ref: 008B7949
                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,008B8754,00000000,?,0000001C,?,?,00000000), ref: 008B7984
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen
                            • String ID: cdecl
                            • API String ID: 4031866154-3896280584
                            • Opcode ID: ab3f8a44df6ed8d97d95b54068c0284698f45122f9d9beb52db4f97a761e1137
                            • Instruction ID: a8a6b6ebe76e7df5474e4d91c409d460d21f905f4284eda8d32cefd2f6b68566
                            • Opcode Fuzzy Hash: ab3f8a44df6ed8d97d95b54068c0284698f45122f9d9beb52db4f97a761e1137
                            • Instruction Fuzzy Hash: A111E63A201342ABCB159F39D845DBA7BA9FF85350B50402AF946CB3A4EB35D811C7A1
                            APIs
                            • GetWindowLongW.USER32(?,000000F0), ref: 008E7D0B
                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 008E7D2A
                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 008E7D42
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,008CB7AD,00000000), ref: 008E7D6B
                              • Part of subcall function 00869BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00869BB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID:
                            • API String ID: 847901565-0
                            • Opcode ID: 6d2e5611c8fee139bcd9ae53f49b5dc74446869a3c172cafd6af063d31bce4dc
                            • Instruction ID: c1935ce43232743a4a0223c0f75365265e48505d717e8f90e59edf3824a93c45
                            • Opcode Fuzzy Hash: 6d2e5611c8fee139bcd9ae53f49b5dc74446869a3c172cafd6af063d31bce4dc
                            • Instruction Fuzzy Hash: 6811AE31614694AFCB108F29DC44A763BA4FF46360B154324FC35CB2F4D7308961DB40
                            APIs
                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 008E56BB
                            • _wcslen.LIBCMT ref: 008E56CD
                            • _wcslen.LIBCMT ref: 008E56D8
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 008E5816
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend_wcslen
                            • String ID:
                            • API String ID: 455545452-0
                            • Opcode ID: bdb542f7c6d825e8066465b87529a0c732e608bcdc791745151cf050f830af34
                            • Instruction ID: cf5040d80c2fce78b8892789ad20c0e0b563f5b318ea4b5cfeb9181afa944030
                            • Opcode Fuzzy Hash: bdb542f7c6d825e8066465b87529a0c732e608bcdc791745151cf050f830af34
                            • Instruction Fuzzy Hash: F311E971A00699A6DF20DF66DCC5AEE7B6CFF2276CF104026F915D6091E770C980CB65
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1846780fa3c79a6f511586edc48418020b8b87d5827e1242810b14f48dda4680
                            • Instruction ID: ee3e63ace61131aa048c3366dfe85af021b06b1858898dac05740f173c504208
                            • Opcode Fuzzy Hash: 1846780fa3c79a6f511586edc48418020b8b87d5827e1242810b14f48dda4680
                            • Instruction Fuzzy Hash: 0E01ADB260961A7EFA2136786CC9F27661DFF813B8B310725F521E11D2DF608C025360
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 008B1A47
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B1A59
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B1A6F
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008B1A8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 2adbf3e6bba5ffbec289ef3688dcee4925a08400e6115e761d80a322707f65bc
                            • Instruction ID: f245e519c8afaf97a741aa936c41d09324e4566bd993b4a1fd294c6588209992
                            • Opcode Fuzzy Hash: 2adbf3e6bba5ffbec289ef3688dcee4925a08400e6115e761d80a322707f65bc
                            • Instruction Fuzzy Hash: 0E11153A901229BFEF109BA48985FADBB78FB08750F200091EA00BB290D6716E509B94
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 008BE1FD
                            • MessageBoxW.USER32(?,?,?,?), ref: 008BE230
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 008BE246
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 008BE24D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                            • String ID:
                            • API String ID: 2880819207-0
                            • Opcode ID: 0d1efc955e920188ef70ba543e63b164f62fcabaf5e2fb81e1ef7dd39a33a200
                            • Instruction ID: 8c16f1faaabb1ede1862d84c98b77eec4a202417fad2a0a64f5194a31e45cffd
                            • Opcode Fuzzy Hash: 0d1efc955e920188ef70ba543e63b164f62fcabaf5e2fb81e1ef7dd39a33a200
                            • Instruction Fuzzy Hash: 3511ED72D08258AFC711DFA8AC49ADE7BADFB45321F108269F825E3391D6B0D90187A0
                            APIs
                            • CreateThread.KERNEL32(00000000,?,0087CFF9,00000000,00000004,00000000), ref: 0087D218
                            • GetLastError.KERNEL32 ref: 0087D224
                            • __dosmaperr.LIBCMT ref: 0087D22B
                            • ResumeThread.KERNEL32(00000000), ref: 0087D249
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                            • String ID:
                            • API String ID: 173952441-0
                            • Opcode ID: 82e836a6cf7cc398969035c5288b7bebefe8200873ffd8e9e7302a784e318f13
                            • Instruction ID: 5d4741c89e9a78144c870e1e85875e28a34077944dd34f0f3dc056b9daf341b3
                            • Opcode Fuzzy Hash: 82e836a6cf7cc398969035c5288b7bebefe8200873ffd8e9e7302a784e318f13
                            • Instruction Fuzzy Hash: E501D636815308BBC7116BA9DC45BAA7A79FF81731F208219F92DD61D6CF70D902C6A1
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0085604C
                            • GetStockObject.GDI32(00000011), ref: 00856060
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0085606A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CreateMessageObjectSendStockWindow
                            • String ID:
                            • API String ID: 3970641297-0
                            • Opcode ID: 07bc93668e89fd4e1c6a5c080c9084719296a2888f557a1e89ef429c1234d1d9
                            • Instruction ID: ed320dcf6bc891fa925dbd85e6f8a06e997ea9a21bf25c9e2d2f4fd6a1fbaa4a
                            • Opcode Fuzzy Hash: 07bc93668e89fd4e1c6a5c080c9084719296a2888f557a1e89ef429c1234d1d9
                            • Instruction Fuzzy Hash: 3011A172501948BFEF124F94DC44EEA7BA9FF18365F440205FE04A6060D732DC65DB90
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 00873B56
                              • Part of subcall function 00873AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00873AD2
                              • Part of subcall function 00873AA3: ___AdjustPointer.LIBCMT ref: 00873AED
                            • _UnwindNestedFrames.LIBCMT ref: 00873B6B
                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00873B7C
                            • CallCatchBlock.LIBVCRUNTIME ref: 00873BA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                            • String ID:
                            • API String ID: 737400349-0
                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction ID: 833f23a3bb8fa1595a6b6a62637999087895f064b637459824081d22e8a8ce7e
                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction Fuzzy Hash: 25012D32100148BBDF115E99CC46DEB7B69FF59754F048018FE5C96125C732D961EBA2
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,008513C6,00000000,00000000,?,0088301A,008513C6,00000000,00000000,00000000,?,0088328B,00000006,FlsSetValue), ref: 008830A5
                            • GetLastError.KERNEL32(?,0088301A,008513C6,00000000,00000000,00000000,?,0088328B,00000006,FlsSetValue,008F2290,FlsSetValue,00000000,00000364,?,00882E46), ref: 008830B1
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0088301A,008513C6,00000000,00000000,00000000,?,0088328B,00000006,FlsSetValue,008F2290,FlsSetValue,00000000), ref: 008830BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: 08bdafe4cd43362f12ae7c069f6fb31a6a700c78290c2e16d37766bf2db7df8d
                            • Instruction ID: bf3a31c743520a6f5c335036d0549457fefbf186527c076b0615f2a8b87e2647
                            • Opcode Fuzzy Hash: 08bdafe4cd43362f12ae7c069f6fb31a6a700c78290c2e16d37766bf2db7df8d
                            • Instruction Fuzzy Hash: D401F732712B26ABCB315BB99C849677B98FF45F61B100720FD05E7141C721D902C7E0
                            APIs
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 008B747F
                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 008B7497
                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008B74AC
                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008B74CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Type$Register$FileLoadModuleNameUser
                            • String ID:
                            • API String ID: 1352324309-0
                            • Opcode ID: 05c81eabf9de3da55548aaa6784b45c82767267a667c4fb16f3882f9b23cdbbd
                            • Instruction ID: a25f6a7099fae390d464714af95c96b16201c41b147d4f44aa450a2f57884088
                            • Opcode Fuzzy Hash: 05c81eabf9de3da55548aaa6784b45c82767267a667c4fb16f3882f9b23cdbbd
                            • Instruction Fuzzy Hash: D911A1B16053159BE7208F14DC48FD27BFCFB40B09F108569E626DA291D770E944DB94
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008BACD3,?,00008000), ref: 008BB0C4
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008BACD3,?,00008000), ref: 008BB0E9
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008BACD3,?,00008000), ref: 008BB0F3
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008BACD3,?,00008000), ref: 008BB126
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: cf71e34ed8b6a50369e34ccb47bdef9e1742c3c302b7d54be856fea54659061b
                            • Instruction ID: 6023e570756c8133b675d87aa4d4e5df13e04ff7688f80e04b28405d574240b5
                            • Opcode Fuzzy Hash: cf71e34ed8b6a50369e34ccb47bdef9e1742c3c302b7d54be856fea54659061b
                            • Instruction Fuzzy Hash: F1115B31D0192DE7CF10AFE8E9986FEBF78FF0A711F114085D951B6281DBB096518B51
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008B2DC5
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 008B2DD6
                            • GetCurrentThreadId.KERNEL32 ref: 008B2DDD
                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008B2DE4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: 43b97782018ce64517dd6ad6639c821d21380225324a5e807591f37d51d096f3
                            • Instruction ID: 0bce87649bcbd03d9cb074e7cbd70cd4ded8c5543f135814249fc8a9ebdcd1a6
                            • Opcode Fuzzy Hash: 43b97782018ce64517dd6ad6639c821d21380225324a5e807591f37d51d096f3
                            • Instruction Fuzzy Hash: 00E092B2901228BBDB201B739C4DFEB3E6CFF52BA1F040119F506D51909AA0C842C6B0
                            APIs
                              • Part of subcall function 00869639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00869693
                              • Part of subcall function 00869639: SelectObject.GDI32(?,00000000), ref: 008696A2
                              • Part of subcall function 00869639: BeginPath.GDI32(?), ref: 008696B9
                              • Part of subcall function 00869639: SelectObject.GDI32(?,00000000), ref: 008696E2
                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 008E8887
                            • LineTo.GDI32(?,?,?), ref: 008E8894
                            • EndPath.GDI32(?), ref: 008E88A4
                            • StrokePath.GDI32(?), ref: 008E88B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                            • String ID:
                            • API String ID: 1539411459-0
                            • Opcode ID: ee3d249101d4a21e26d00bec081b664645467debe93930c4ec03ce16e62e9dd5
                            • Instruction ID: f49c5c64534f3b83a948acc54b06dff461b1c36c3875d1398a57a5256b570f89
                            • Opcode Fuzzy Hash: ee3d249101d4a21e26d00bec081b664645467debe93930c4ec03ce16e62e9dd5
                            • Instruction Fuzzy Hash: 9DF05E3A0456A8FADB125F94AC09FCE3F59BF16310F048000FE11A90E1C7755562DFE5
                            APIs
                            • GetSysColor.USER32(00000008), ref: 008698CC
                            • SetTextColor.GDI32(?,?), ref: 008698D6
                            • SetBkMode.GDI32(?,00000001), ref: 008698E9
                            • GetStockObject.GDI32(00000005), ref: 008698F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Color$ModeObjectStockText
                            • String ID:
                            • API String ID: 4037423528-0
                            • Opcode ID: 94ae45cfbc17b9e4f6f5c7ef3e159ef433c93d1ba2d9c71290df89ac21e9e2e8
                            • Instruction ID: 1c86dd9c04ce6599a6ca78e366e8957a4914268127658f9e438dc5bc46187c43
                            • Opcode Fuzzy Hash: 94ae45cfbc17b9e4f6f5c7ef3e159ef433c93d1ba2d9c71290df89ac21e9e2e8
                            • Instruction Fuzzy Hash: 19E06D31A44680AAEB215B78EC49BE83F20FB12336F048219F6FA980E1C3714641AB10
                            APIs
                            • GetCurrentThread.KERNEL32 ref: 008B1634
                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,008B11D9), ref: 008B163B
                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008B11D9), ref: 008B1648
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,008B11D9), ref: 008B164F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CurrentOpenProcessThreadToken
                            • String ID:
                            • API String ID: 3974789173-0
                            • Opcode ID: 71b53813ed9a38098270a9a188086c01dda442a580968031188b4f1924f35bf5
                            • Instruction ID: c52dd3210b21d0e2c7a742e1057a549477e6a26c83ea3cb97519e0f7e15e765a
                            • Opcode Fuzzy Hash: 71b53813ed9a38098270a9a188086c01dda442a580968031188b4f1924f35bf5
                            • Instruction Fuzzy Hash: 59E08C32A02211EBDB201FA5AE4DB8A3B7CFF557A2F148808F645CD080E7349442CB60
                            APIs
                            • GetDesktopWindow.USER32 ref: 008AD858
                            • GetDC.USER32(00000000), ref: 008AD862
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008AD882
                            • ReleaseDC.USER32(?), ref: 008AD8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: b6c52a845500d1ec21709be52e16ddc727dc80237714926740d82d4b62a1a74f
                            • Instruction ID: 4cf7e79d34f6af308c5279d1a6ad21f745ae5bae058c30da03ceb6b9bbaf124e
                            • Opcode Fuzzy Hash: b6c52a845500d1ec21709be52e16ddc727dc80237714926740d82d4b62a1a74f
                            • Instruction Fuzzy Hash: 99E01AB4C00304DFCF419FA4D84866EBBB1FB58311F108419E816EB260CB384902AF41
                            APIs
                            • GetDesktopWindow.USER32 ref: 008AD86C
                            • GetDC.USER32(00000000), ref: 008AD876
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008AD882
                            • ReleaseDC.USER32(?), ref: 008AD8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: b67fa97031a14e90ce505c3c475fe0abbeee0842b3d31a1938256e05549bd5ac
                            • Instruction ID: 9350f812a44680aab53b9c9d898d9a0d134cf0293af120683e8bc5ace524e9bb
                            • Opcode Fuzzy Hash: b67fa97031a14e90ce505c3c475fe0abbeee0842b3d31a1938256e05549bd5ac
                            • Instruction Fuzzy Hash: DFE012B4C00204EFCF40AFA4D88866EBBB1FB58311B108408E81AEB260CB385902AF40
                            APIs
                              • Part of subcall function 00857620: _wcslen.LIBCMT ref: 00857625
                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 008C4ED4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Connection_wcslen
                            • String ID: *$LPT
                            • API String ID: 1725874428-3443410124
                            • Opcode ID: 98543bf68f03ddd161b414251d0eb0d7fabd228647ab78a26b76fbd9772031b3
                            • Instruction ID: 8e17b23008c1a0442093456f51a666f2b35e24aa17b7fd191926d96e120278ea
                            • Opcode Fuzzy Hash: 98543bf68f03ddd161b414251d0eb0d7fabd228647ab78a26b76fbd9772031b3
                            • Instruction Fuzzy Hash: 1C914A75A002049FDB14DF58C494EAABBF1FF44318F19909DE84A9B3A2DB31ED85CB91
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 0087E30D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: 0f8c0280bf88f724b0b714ffb9165bb4cd6392db09b4536133e9423b67f8413f
                            • Instruction ID: 9666cf0723e456e1e6490ac08e2e3b12c6dfd5ee4b7cc7b0a647490a7a4ef3d0
                            • Opcode Fuzzy Hash: 0f8c0280bf88f724b0b714ffb9165bb4cd6392db09b4536133e9423b67f8413f
                            • Instruction Fuzzy Hash: 28514961A1C20696DB217728C9417793BB4FB54B40F34C9E8E099C33AEEB35CC91DB46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID:
                            • String ID: #
                            • API String ID: 0-1885708031
                            • Opcode ID: 2c6f2acf833a99c46d877844411ca82067388ccc61044115af209d504887352f
                            • Instruction ID: 0767bd247a8b1fca43cf82c065a745ea953930dcbbfd804f1fbadb444340f50f
                            • Opcode Fuzzy Hash: 2c6f2acf833a99c46d877844411ca82067388ccc61044115af209d504887352f
                            • Instruction Fuzzy Hash: 1451657990424ADFEB15DF28C491ABA7BA5FF16310F244415FC91DB2C0DB349D46CBA1
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 0086F2A2
                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0086F2BB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: 2713fff3a89a6c56187c602e1913db5f6fe93147be44eccae12cfdfd2a566391
                            • Instruction ID: 20ba8ba38d72678ebad36ba6fbd276e1d2d7ed96ed5b9a5ceafd0b8d91c296d6
                            • Opcode Fuzzy Hash: 2713fff3a89a6c56187c602e1913db5f6fe93147be44eccae12cfdfd2a566391
                            • Instruction Fuzzy Hash: 5D5125714187449BD320AF14EC86BAFBBF8FB84301F81885DF6D9811A5EB708529CB67
                            APIs
                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008D57E0
                            • _wcslen.LIBCMT ref: 008D57EC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: BuffCharUpper_wcslen
                            • String ID: CALLARGARRAY
                            • API String ID: 157775604-1150593374
                            • Opcode ID: 824241be3cc55a1967de8666b7286f8ed560af378f6d5897a3810f60225a45ca
                            • Instruction ID: 088d2e3f56eb6650d534ce2a22b0900a43f2a60c1ad854fdad74a8f5c216a871
                            • Opcode Fuzzy Hash: 824241be3cc55a1967de8666b7286f8ed560af378f6d5897a3810f60225a45ca
                            • Instruction Fuzzy Hash: 9341AE31E002099FCB14DFA9C8819AEBBB5FF59724F10416BE505E7351EB309D81DB91
                            APIs
                            • _wcslen.LIBCMT ref: 008CD130
                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008CD13A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CrackInternet_wcslen
                            • String ID: |
                            • API String ID: 596671847-2343686810
                            • Opcode ID: 2f4e7769bd29b1325c4d0f3a4914bb6b82b1a2817c37f76974f848406d444886
                            • Instruction ID: 7dc2eeb60c93f5507c4f6eed4806ccc6abc55a5dade9ab160992fdd100ac9f21
                            • Opcode Fuzzy Hash: 2f4e7769bd29b1325c4d0f3a4914bb6b82b1a2817c37f76974f848406d444886
                            • Instruction Fuzzy Hash: 33310A71D01219ABCF15EFA4CC85EEEBFBAFF04304F100029F815A6166E731AA56CB51
                            APIs
                            • DestroyWindow.USER32(?,?,?,?), ref: 008E3621
                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 008E365C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$DestroyMove
                            • String ID: static
                            • API String ID: 2139405536-2160076837
                            • Opcode ID: 0d00b777f1d58fdd7c7c2e1d98b7748d7f7f243553bee3cc0d4858681be871a7
                            • Instruction ID: 0856bc11d60ba6f85c7ab6fc81564553f4ef6b5052e9a61defdc90070d3c612d
                            • Opcode Fuzzy Hash: 0d00b777f1d58fdd7c7c2e1d98b7748d7f7f243553bee3cc0d4858681be871a7
                            • Instruction Fuzzy Hash: 0031BC71100644AEDB209F39DC84EFB73A9FF99720F008619F8A5D7290DA30ED92DB60
                            APIs
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 008E461F
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008E4634
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: '
                            • API String ID: 3850602802-1997036262
                            • Opcode ID: 675226e9a59675336e5dd7dd1fc4420296139e6afbe106b5d2fd51173d9b707b
                            • Instruction ID: b386106ef0f2c2bf80e5f0837f15e016a581973e41683d9916898790c3a085f7
                            • Opcode Fuzzy Hash: 675226e9a59675336e5dd7dd1fc4420296139e6afbe106b5d2fd51173d9b707b
                            • Instruction Fuzzy Hash: 1D313974A0034A9FDB14CF6AC980BDA7BB5FF1A300F105169E908EB351D770A941CF90
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008E327C
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008E3287
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: 7b7414bfed43de578d659e040e11aca0f9edc9a9d5f86df08f68efe1a76daec1
                            • Instruction ID: 57a073bd3db8e42f8d615249a8ceb9d1d2713faf1fa092ea4eda238a66cdc92a
                            • Opcode Fuzzy Hash: 7b7414bfed43de578d659e040e11aca0f9edc9a9d5f86df08f68efe1a76daec1
                            • Instruction Fuzzy Hash: EE11E2713002487FEF219E95DC88EBB37AAFB96365F100128FA58E7290D6319D618760
                            APIs
                              • Part of subcall function 0085600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0085604C
                              • Part of subcall function 0085600E: GetStockObject.GDI32(00000011), ref: 00856060
                              • Part of subcall function 0085600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0085606A
                            • GetWindowRect.USER32(00000000,?), ref: 008E377A
                            • GetSysColor.USER32(00000012), ref: 008E3794
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                            • String ID: static
                            • API String ID: 1983116058-2160076837
                            • Opcode ID: 62edcac84d7f59d3e27a2d1826d92e3e01e5ee40dd80f2560b8d28f7cc24f9f8
                            • Instruction ID: d67a3db05cdc68d824b7d2527f4c4e077ac80720ab9926c6b52cd9f99245e6bb
                            • Opcode Fuzzy Hash: 62edcac84d7f59d3e27a2d1826d92e3e01e5ee40dd80f2560b8d28f7cc24f9f8
                            • Instruction Fuzzy Hash: 631129B2610249AFDF10DFA8CC49AFA7BB8FB09314F004524FD55E3250E735E9619B50
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 008CCD7D
                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 008CCDA6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Internet$OpenOption
                            • String ID: <local>
                            • API String ID: 942729171-4266983199
                            • Opcode ID: f0700eaec3e808fd7969253eed95fa5af3e32f9fc0ca836268172dce5ad56bf2
                            • Instruction ID: 1d0375425d261946257ea61142d0b4e68478a2a35f4c378af0b20f6adc3a32b2
                            • Opcode Fuzzy Hash: f0700eaec3e808fd7969253eed95fa5af3e32f9fc0ca836268172dce5ad56bf2
                            • Instruction Fuzzy Hash: 9611A371605636BAD7244A669C85FE7BE78FB127A8F00422AF20EC6080D670D841D6F0
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 008E34AB
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008E34BA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: 85480043936409ec573aa4cdf6b943c1438986f2cee36d98d848304cf3bfbfb5
                            • Instruction ID: 5cdaa2ccb311d1c0bd24d3f9a28a8a0acef8c29ba25c8da699be42bb40d587a4
                            • Opcode Fuzzy Hash: 85480043936409ec573aa4cdf6b943c1438986f2cee36d98d848304cf3bfbfb5
                            • Instruction Fuzzy Hash: 7611BF71500188ABEB124E65DC88AAB376AFB26378F504324F960D71E0C731DD519B58
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                            • CharUpperBuffW.USER32(?,?,?), ref: 008B6CB6
                            • _wcslen.LIBCMT ref: 008B6CC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: STOP
                            • API String ID: 1256254125-2411985666
                            • Opcode ID: c78df9ab7bcfc0c7ef5efdf584c8565c3a07f1902f9d8d6b868a352442e8ec74
                            • Instruction ID: 05df72986cc0eba8acba7be135f9a359a0e8bc9fb14237a3e20ba82e346ae826
                            • Opcode Fuzzy Hash: c78df9ab7bcfc0c7ef5efdf584c8565c3a07f1902f9d8d6b868a352442e8ec74
                            • Instruction Fuzzy Hash: 92010832A005268BCB209FBDCCA19FF3BA5FB617107010524E862D62A0FB35DD14C650
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008B3CCA
                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 008B1D4C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: 33dfec090271178b9a7c77a69205d39c2a93740433ef3cb1cc003f2747844e7e
                            • Instruction ID: 920a37a954415bc1a5c513ab9b07b3abbf235bef44c3967192b76c88b70f002a
                            • Opcode Fuzzy Hash: 33dfec090271178b9a7c77a69205d39c2a93740433ef3cb1cc003f2747844e7e
                            • Instruction Fuzzy Hash: E001D875641218EB8F04EBA8CC65CFE7769FB56350B540919FC62DB3D1EA30590C8661
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008B3CCA
                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 008B1C46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: dd5dc8c799bb56903c3c92be88e6e9f1657289cf08af46eca92a0778ac3bb452
                            • Instruction ID: 65a2eab52de55c9b4b2e188c13f450380a0c373d3c8a930270fa78496be0f277
                            • Opcode Fuzzy Hash: dd5dc8c799bb56903c3c92be88e6e9f1657289cf08af46eca92a0778ac3bb452
                            • Instruction Fuzzy Hash: C901AC75781108A7CF04E794C9769FF7BA8FB51340F540019E846E7382EA209F0CC672
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008B3CCA
                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 008B1CC8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: 657c915a38b8b45022f6dac974eae76079cdee00031e1a6c3bbb248f341b7222
                            • Instruction ID: d0c39bacb562a26f8795d4e378b1cb1dac7045d82f001de561208c625748cbba
                            • Opcode Fuzzy Hash: 657c915a38b8b45022f6dac974eae76079cdee00031e1a6c3bbb248f341b7222
                            • Instruction Fuzzy Hash: 36016775781118A7CF14E798CA65AFE7BA8FB51340B550415BC41F7381EA619F0CC672
                            APIs
                              • Part of subcall function 00859CB3: _wcslen.LIBCMT ref: 00859CBD
                              • Part of subcall function 008B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008B3CCA
                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 008B1DD3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: a13e67e2d6e3fd95f90bfcece4cc2ef981be9a9c0900948f986e7117ffea9483
                            • Instruction ID: d54aaf798784f5cd9fe57d2281a273a4abd09b0b5382fc9fff3ce736c76c9b30
                            • Opcode Fuzzy Hash: a13e67e2d6e3fd95f90bfcece4cc2ef981be9a9c0900948f986e7117ffea9483
                            • Instruction Fuzzy Hash: 25F0A475B41218A6DB14E7A8CC66AFF7778FB41354F980919F862E73C2DE605A0C8261
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: 3, 3, 16, 1
                            • API String ID: 176396367-3042988571
                            • Opcode ID: 01ed54c97d225c605f8d14ea9e9ae8d1ebc4cc96758ee347e72e0cb2dd85c8b5
                            • Instruction ID: 8a9bb23f756062fed75b17ae845a378c7f78ab6459a903e9ced43f8071880794
                            • Opcode Fuzzy Hash: 01ed54c97d225c605f8d14ea9e9ae8d1ebc4cc96758ee347e72e0cb2dd85c8b5
                            • Instruction Fuzzy Hash: 86E02301304210115232127D9CC167F5B8AFFC5750710141BF645C237EF754CD9153A6
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 008B0B23
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: Message
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 2030045667-4017498283
                            • Opcode ID: cb9f259835aec427f2953d17569825cfdef3888e544c22525786f61ee7fe5edc
                            • Instruction ID: 3befdbd6fe72ad53bf5e5195c58d9d37c3b17f3cf7fd6baa1d70352d50338467
                            • Opcode Fuzzy Hash: cb9f259835aec427f2953d17569825cfdef3888e544c22525786f61ee7fe5edc
                            • Instruction Fuzzy Hash: 8DE0D83228434826D214369D7C03FC97E84FF06B65F100426FB98D95C38BE2689006AA
                            APIs
                              • Part of subcall function 0086F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00870D71,?,?,?,0085100A), ref: 0086F7CE
                            • IsDebuggerPresent.KERNEL32(?,?,?,0085100A), ref: 00870D75
                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0085100A), ref: 00870D84
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00870D7F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 55579361-631824599
                            • Opcode ID: 9d819b89a017abce074fb6da11c12f799203e725deb551b29c843271d127d0e3
                            • Instruction ID: 6a52fe76cf87ea2827d327f7b2234c08e36d41cfb9376e214eeef905e9548151
                            • Opcode Fuzzy Hash: 9d819b89a017abce074fb6da11c12f799203e725deb551b29c843271d127d0e3
                            • Instruction Fuzzy Hash: 55E06D702007828FD3309FBDE4443427BE0FB10744F008A2DE696CA656DBB4E4498F91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: LocalTime
                            • String ID: %.3d$X64
                            • API String ID: 481472006-1077770165
                            • Opcode ID: 8212fa6688e4e22b75a1b64b63a2a51cfeaa382ad0dd770a10b4558eb23bb468
                            • Instruction ID: 9ace01d34ae698e0ec8b8dcb274019ee137873a7cfa4605919ee8abbcb2024a7
                            • Opcode Fuzzy Hash: 8212fa6688e4e22b75a1b64b63a2a51cfeaa382ad0dd770a10b4558eb23bb468
                            • Instruction Fuzzy Hash: 2ED012A1C0830DE9DB5096D0DC45AF9B37CFB09305F508452F907D1841D624E549E762
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008E232C
                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 008E233F
                              • Part of subcall function 008BE97B: Sleep.KERNEL32 ref: 008BE9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 2be9fa8bf12fef6ac98013ca13dec6aa0d0ca012b3df94407bf01074b13db244
                            • Instruction ID: 7704fd12da13e57f9370dd799287409391d93a974ba17f82e9e0448b437dc901
                            • Opcode Fuzzy Hash: 2be9fa8bf12fef6ac98013ca13dec6aa0d0ca012b3df94407bf01074b13db244
                            • Instruction Fuzzy Hash: 38D0C936B95350BAE6A4A7709C8FFC66A14BB50B14F00491A7645AA1E0C9A0A8468A54
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008E236C
                            • PostMessageW.USER32(00000000), ref: 008E2373
                              • Part of subcall function 008BE97B: Sleep.KERNEL32 ref: 008BE9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: b78613106a885236e493a280d7f994bf49c1b69e1706aae57ef55a5762c520c5
                            • Instruction ID: 46e9d2f6e3b6a61abfb5c284b06752457c22bb2270c868ce94f0250efab123cb
                            • Opcode Fuzzy Hash: b78613106a885236e493a280d7f994bf49c1b69e1706aae57ef55a5762c520c5
                            • Instruction Fuzzy Hash: 5CD0C936B81350BAE6A4A7709C8FFC66A14BB54B14F00491A7645EA1E0C9A0B8468A54
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0088BE93
                            • GetLastError.KERNEL32 ref: 0088BEA1
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0088BEFC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2195267176.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                            • Associated: 00000000.00000002.2195253073.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195318191.0000000000912000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195761184.000000000091C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2195785263.0000000000924000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_850000_shipping advice.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: 993afbc7c32672336e49e07bf01cd8cb33913265c3c70fc620d59f39c1689535
                            • Instruction ID: 40ab63165cdcc5b8642934a478c1f0288f5fd5ede77b3850593f60d17a2c3b12
                            • Opcode Fuzzy Hash: 993afbc7c32672336e49e07bf01cd8cb33913265c3c70fc620d59f39c1689535
                            • Instruction Fuzzy Hash: C141E735604206AFCF31AFA9CC44ABA7BA5FF82710F244169FA59DB1A1DF309D01DB61