Loading ...

Play interactive tourEdit tour

Windows Analysis Report DHL AWB - 5032675620 _SEPTEMBER 2021.exe

Overview

General Information

Sample Name:DHL AWB - 5032675620 _SEPTEMBER 2021.exe
Analysis ID:483724
MD5:d96d6c6caef758178386d9e0fc47b21a
SHA1:8d90376c829099fc4e551d36e691b53b9a48a0cd
SHA256:bd2b1d4a42425cd431ced38103c95651b9112a20ecb967640e1d79a83b051096
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Creates processes with suspicious names
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "sam@htprress.com", "Password": "#m!Bebe2", "Host": "smtp.htprress.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.625722721.0000000002EC2000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.4086d60.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "sam@htprress.com", "Password": "#m!Bebe2", "Host": "smtp.htprress.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeReversingLabs: Detection: 22%
                      Source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://PoIpyH.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384448811.0000000001577000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmp, DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000003.361243845.000000000157C000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000003.361243845.000000000157C000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comi
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625673123.0000000002EB2000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.383789894.00000000012BB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      .NET source code contains very large stringsShow sources
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, Form1.csLong String: Length: 38272
                      Source: 0.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.csLong String: Length: 38272
                      Source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.csLong String: Length: 38272
                      Source: 5.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.0.unpack, Form1.csLong String: Length: 38272
                      Source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.1.unpack, Form1.csLong String: Length: 38272
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 0_2_0155E6180_2_0155E618
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 0_2_0155E6080_2_0155E608
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 0_2_0155BC740_2_0155BC74
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD61F05_2_00BD61F0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD01305_2_00BD0130
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BDABD85_2_00BDABD8
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD14B35_2_00BD14B3
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BDD5E05_2_00BDD5E0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD9A985_2_00BD9A98
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD74405_2_00BD7440
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00BD5FD05_2_00BD5FD0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_013246A05_2_013246A0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_013245B05_2_013245B0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_013245D05_2_013245D0
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeBinary or memory string: OriginalFilename vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.393446736.0000000007650000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.382708188.0000000000B42000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameProgre.exeh$ vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384649317.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamerybORYCDEFoesqHgsUsRhLynNqcdWc.exe4 vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384720716.0000000002EB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.383789894.00000000012BB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeBinary or memory string: OriginalFilename vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.622519778.0000000000438000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamerybORYCDEFoesqHgsUsRhLynNqcdWc.exe4 vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.622560088.0000000000A12000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameProgre.exeh$ vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.623345320.0000000000EF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeBinary or memory string: OriginalFilenameProgre.exeh$ vs DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeReversingLabs: Detection: 22%
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe 'C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe'
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess created: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess created: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL AWB - 5032675620 _SEPTEMBER 2021.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.1.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.b40000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.a10000.1.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 0_2_00B4297F push 20000001h; retf 0_2_00B42992
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_00A1297F push 20000001h; retf 5_2_00A12992
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_0128D95C push eax; ret 5_2_0128D95D
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeCode function: 5_2_0128E32E push eax; ret 5_2_0128E349
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.55147580735
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile created: \dhl awb - 5032675620 _september 2021.exe
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile created: \dhl awb - 5032675620 _september 2021.exeJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 5996, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe TID: 3492Thread sleep time: -40447s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe TID: 4112Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe TID: 4844Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe TID: 3216Thread sleep count: 9354 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe TID: 3216Thread sleep count: 503 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWindow / User API: threadDelayed 9354Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWindow / User API: threadDelayed 503Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeThread delayed: delay time: 40447Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000003.382128548.00000000075B0000.00000004.00000001.sdmpBinary or memory string: VmsRvC
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeMemory written: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeProcess created: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeJump to behavior
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.624817545.0000000001820000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.624817545.0000000001820000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.624817545.0000000001820000.00000002.00020000.sdmpBinary or memory string: &Program Manager
                      Source: DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.624817545.0000000001820000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.4086d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.625722721.0000000002EC2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 5996, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 6552, type: MEMORYSTR
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: Yara matchFile source: 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 6552, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.4086d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.3f6e188.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.625722721.0000000002EC2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 5996, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DHL AWB - 5032675620 _SEPTEMBER 2021.exe PID: 6552, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential Dumping1Security Software Discovery211Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesArchive Collected Data11Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelData from Local System1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery114SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      DHL AWB - 5032675620 _SEPTEMBER 2021.exe22%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.DHL AWB - 5032675620 _SEPTEMBER 2021.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://PoIpyH.com2%VirustotalBrowse
                      http://PoIpyH.com0%Avira URL Cloudsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.fontbureau.coma0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.tiro.comi0%Avira URL Cloudsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                            high
                            http://DynDns.comDynDNSDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers?DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                high
                                http://www.tiro.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmp, DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000003.361243845.000000000157C000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://PoIpyH.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpfalse
                                • 2%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designersDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.goodfont.co.krDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comaDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.384448811.0000000001577000.00000004.00000040.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                        high
                                        https://api.ipify.org%GETMozilla/5.0DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        low
                                        http://www.fonts.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.sandoll.co.krDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.tiro.comiDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000003.361243845.000000000157C000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.urwpp.deDPleaseDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sakkal.comDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.392302360.0000000006FB2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org%DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.625673123.0000000002EB2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          low
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipDHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, DHL AWB - 5032675620 _SEPTEMBER 2021.exe, 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown

                                          Contacted IPs

                                          No contacted IP infos

                                          General Information

                                          Joe Sandbox Version:33.0.0 White Diamond
                                          Analysis ID:483724
                                          Start date:15.09.2021
                                          Start time:12:15:13
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 8m 56s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:20
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 0% (good quality ratio 0%)
                                          • Quality average: 100%
                                          • Quality standard deviation: 0%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 67
                                          • Number of non-executed functions: 3
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          12:16:44API Interceptor718x Sleep call for process: DHL AWB - 5032675620 _SEPTEMBER 2021.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          No context

                                          Domains

                                          No context

                                          ASN

                                          No context

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL AWB - 5032675620 _SEPTEMBER 2021.exe.log
                                          Process:C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.482062528543043
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          File size:721920
                                          MD5:d96d6c6caef758178386d9e0fc47b21a
                                          SHA1:8d90376c829099fc4e551d36e691b53b9a48a0cd
                                          SHA256:bd2b1d4a42425cd431ced38103c95651b9112a20ecb967640e1d79a83b051096
                                          SHA512:fcda56cdb75404292d257ecb9885f914f1024706feb2b6d1195ff7802b614d0bb96a0e85d1617424cb15824e08106244e4236e5db2fc2388d2e99be727f86d44
                                          SSDEEP:12288:aWWHCM2K4CEI/yzQs2TaIpIDW7HpnMk7CFnc7R6um8Cg8RZe+DFI:aK3CRMIpIDWlMef7fV8re+xI
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Aa..............0......n........... ........@.. .......................`............@................................

                                          File Icon

                                          Icon Hash:f1f0f4d0eecccc71

                                          Static PE Info

                                          General

                                          Entrypoint:0x4ab286
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x61419282 [Wed Sep 15 06:28:18 2021 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                          Entrypoint Preview

                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xab2340x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x6b78.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xa928c0xa9400False0.827673502123data7.55147580735IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0xac0000x6b780x6c00False0.442527488426data5.09070609963IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xb40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xac2000x668data
                                          RT_ICON0xac8780x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 1953594267, next used block 28725
                                          RT_ICON0xacb700x128GLS_BINARY_LSB_FIRST
                                          RT_ICON0xacca80xea8data
                                          RT_ICON0xadb600x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0xae4180x568GLS_BINARY_LSB_FIRST
                                          RT_ICON0xae9900x25a8data
                                          RT_ICON0xb0f480x10a8data
                                          RT_ICON0xb20000x468GLS_BINARY_LSB_FIRST
                                          RT_GROUP_ICON0xb24780x84data
                                          RT_VERSION0xb250c0x46cdata
                                          RT_MANIFEST0xb29880x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                          Imports

                                          DLLImport
                                          mscoree.dll_CorExeMain

                                          Version Infos

                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyrightCopyright 2008 - 2010
                                          Assembly Version1.3.0.0
                                          InternalNameProgre.exe
                                          FileVersion1.3.0.0
                                          CompanyNameWHC
                                          LegalTrademarks
                                          CommentsA little Tool where you can check the stats of your RYL - Risk Your Life - characters. Ruins of War version.
                                          ProductNameRYL Character Tool - RoW EU version
                                          ProductVersion1.3.0.0
                                          FileDescriptionRYL Character Tool - RoW EU version
                                          OriginalFilenameProgre.exe

                                          Network Behavior

                                          No network behavior found

                                          Code Manipulations

                                          Statistics

                                          CPU Usage

                                          Click to jump to process

                                          Memory Usage

                                          Click to jump to process

                                          High Level Behavior Distribution

                                          Click to dive into process behavior distribution

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:12:16:32
                                          Start date:15/09/2021
                                          Path:C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe'
                                          Imagebase:0xb40000
                                          File size:721920 bytes
                                          MD5 hash:D96D6C6CAEF758178386D9E0FC47B21A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.384708060.0000000002EB2000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.387513631.0000000003EA9000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:12:16:45
                                          Start date:15/09/2021
                                          Path:C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\DHL AWB - 5032675620 _SEPTEMBER 2021.exe
                                          Imagebase:0xa10000
                                          File size:721920 bytes
                                          MD5 hash:D96D6C6CAEF758178386D9E0FC47B21A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.625722721.0000000002EC2000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.622420916.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.625103449.0000000002E11000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          Disassembly

                                          Code Analysis

                                          Reset < >

                                            Executed Functions

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0155968E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: e6bae5cd209b4e85c4cd554b47a9a501b46381ea46a505c2426baf2a71a75b35
                                            • Instruction ID: fb83465e02573f017ca446969abea9cb2c99803472d2bc6e79e7a339617991bf
                                            • Opcode Fuzzy Hash: e6bae5cd209b4e85c4cd554b47a9a501b46381ea46a505c2426baf2a71a75b35
                                            • Instruction Fuzzy Hash: 72714870A00B05CFD764DF2AD55175ABBF5BF88208F00892ED44ADBA50DB39E819CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0155FEAA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: d02d4403ac69187b5276b7ef49cbe9f7ff2ad9e64955c46f0d90f179fce7b655
                                            • Instruction ID: 1d9f03ffc333e0972c438de21acdae329b76cf452270b0f80d04d0e3228aef20
                                            • Opcode Fuzzy Hash: d02d4403ac69187b5276b7ef49cbe9f7ff2ad9e64955c46f0d90f179fce7b655
                                            • Instruction Fuzzy Hash: FE51D0B1D00308DFDB54CF99D994ADEBBB5FF48714F24852AE819AB210D7749845CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0155FEAA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 9c9127a262786fc636c6c71f76693e2bf15d344a78cfed4b61b586987c7cbb67
                                            • Instruction ID: 2a9dd8047e69b89085146f2148234654dbfcd5aa1866561309b83e872c3e3a80
                                            • Opcode Fuzzy Hash: 9c9127a262786fc636c6c71f76693e2bf15d344a78cfed4b61b586987c7cbb67
                                            • Instruction Fuzzy Hash: 1351DDB1D00308DFDB54CFA9D984ADEBBB5BF48314F24852AE819AB250D774A885CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01555421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 74b72235443f823b6e82f2741ea5a05430e3378c149e1c5d29085ef0773822b8
                                            • Instruction ID: 1d7f1eb6c5fe4e51a41919aaee919ed4a669b5c17199126d5087368d248a190c
                                            • Opcode Fuzzy Hash: 74b72235443f823b6e82f2741ea5a05430e3378c149e1c5d29085ef0773822b8
                                            • Instruction Fuzzy Hash: 4D4101B1D0061CCBDB24CFA9C9957CDBBB5BF48308F24846AD408AB250DB756946CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01555421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 7089c41766341bcadbf731689d68c7505364909cab1d789b68a007cd4f23669e
                                            • Instruction ID: b51f73a596f55bed347056257365fb77fbf9af0cd4496a6124d9bb5bffb7eafa
                                            • Opcode Fuzzy Hash: 7089c41766341bcadbf731689d68c7505364909cab1d789b68a007cd4f23669e
                                            • Instruction Fuzzy Hash: 0441F070D0061CCBDB24CFE9C995BCEBBB5BF48308F24846AD509AB250EBB56945CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0155B91E,?,?,?,?,?), ref: 0155BDE7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 5ebc7220613858817b873aba8d8e86335daafb95352aa8e2deccdf0bafc119de
                                            • Instruction ID: e4701ecc93f2544cdf102eb17d3d1b2ac89a2c600f1fd3cbc9d183d10c370792
                                            • Opcode Fuzzy Hash: 5ebc7220613858817b873aba8d8e86335daafb95352aa8e2deccdf0bafc119de
                                            • Instruction Fuzzy Hash: FF21E3B5900208DFDB10CFAAD985ADEBBF9FB48324F14841AE914A7310D378A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0155B91E,?,?,?,?,?), ref: 0155BDE7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 97066582b95a50bb87a5b66afb997009cd52df1cf64d4b815863330a0cc47581
                                            • Instruction ID: aab8e735591caf47094978672cb035ea4673c2caf6362c97920c41d8164fee08
                                            • Opcode Fuzzy Hash: 97066582b95a50bb87a5b66afb997009cd52df1cf64d4b815863330a0cc47581
                                            • Instruction Fuzzy Hash: DD21E4B59002089FDB10CFAAD985ADEBFF8FB48324F14841AE914B7310D378A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01559709,00000800,00000000,00000000), ref: 0155991A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: ce94e144d630959498d3c1110d90d7f9bc9bdb44b6c0c954cbe402c968a843f7
                                            • Instruction ID: 679f45b1882264b4e66be259a3fcabc1633d379d2090e668f2d21ef0b9a0f71e
                                            • Opcode Fuzzy Hash: ce94e144d630959498d3c1110d90d7f9bc9bdb44b6c0c954cbe402c968a843f7
                                            • Instruction Fuzzy Hash: AF1103B6900249DFDB10CF9AC984ADEFBF4FB48324F14842AD919A7210C378A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01559709,00000800,00000000,00000000), ref: 0155991A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 4cc05ee226dcf3dbf4bebe18ab6fc12c0a3e6bb50dfad8dec5a1fd111200f990
                                            • Instruction ID: 6a6be58da234722aea6d93805fdab282e253ff087e07a066b78ce9fb262850b6
                                            • Opcode Fuzzy Hash: 4cc05ee226dcf3dbf4bebe18ab6fc12c0a3e6bb50dfad8dec5a1fd111200f990
                                            • Instruction Fuzzy Hash: F81100B6D00249CFDB10CFA9D984ADEFBF4AB48324F14842AD819B7610C378A545CFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0155968E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: f162138c478a8f1e7a4ea25be5d1d772e497b78a49ee6566733c6c339579dfa7
                                            • Instruction ID: 995d96b1653a5edb676097f61033ee68296a1654b4b46d55c764d78240f9794f
                                            • Opcode Fuzzy Hash: f162138c478a8f1e7a4ea25be5d1d772e497b78a49ee6566733c6c339579dfa7
                                            • Instruction Fuzzy Hash: 8011DFB6C006498FDB10CF9AC944ADEFBF4AB88324F14842AD819A7610D379A545CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.383751033.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0171d98ceec017eec7a73133b335bade0d27884356c60bf29604920028d8fe9d
                                            • Instruction ID: b23de9d6731c99e1249e23b6d277a51d7db9c63cf10aae55305eabef589c7b00
                                            • Opcode Fuzzy Hash: 0171d98ceec017eec7a73133b335bade0d27884356c60bf29604920028d8fe9d
                                            • Instruction Fuzzy Hash: 69217C75510348DFDB01CF94C9C0B56BF65FB88324F60C56DD9090B616C336E856CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384185678.00000000014BD000.00000040.00000001.sdmp, Offset: 014BD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2f1bc79829bc4fe825f4f3a987ca07b76f05fc8bae31409fc851091188210377
                                            • Instruction ID: c105519296d2224c8cfe10484a53df05e0bf7882fc8c1e40279bf430c897b94b
                                            • Opcode Fuzzy Hash: 2f1bc79829bc4fe825f4f3a987ca07b76f05fc8bae31409fc851091188210377
                                            • Instruction Fuzzy Hash: EC2103B1904240DFCB15CFA4D9C4B56BB65EB8836CF24C9AAD8090B366C336D807CA71
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384185678.00000000014BD000.00000040.00000001.sdmp, Offset: 014BD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85764a390d1b0def445793b9af67df8c842634df2e583127ebf0e3a8e593b386
                                            • Instruction ID: 6813e26c6b0dc6e651cd4cd11b86d5bc5ff247ea5b2eb75a6c135d36cb25c16e
                                            • Opcode Fuzzy Hash: 85764a390d1b0def445793b9af67df8c842634df2e583127ebf0e3a8e593b386
                                            • Instruction Fuzzy Hash: 5F21D371904284EFDB09CFA4D9C0B56BB65FB84328F24C9AED8094B362C736D856CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384185678.00000000014BD000.00000040.00000001.sdmp, Offset: 014BD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 583df569d61c3d328d9c3623ca23424c35991bf2915565a94e770c638ea3c6df
                                            • Instruction ID: 0771f5a9ac6bacf9746dcec6a7acbe8463ff166ac41c1c190024b66d908ba591
                                            • Opcode Fuzzy Hash: 583df569d61c3d328d9c3623ca23424c35991bf2915565a94e770c638ea3c6df
                                            • Instruction Fuzzy Hash: 252180755093808FCB12CF24D5D0756BF71EB46218F28C5DBD8498B667C33A980ACB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.383751033.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 593b7f8078e8e3006706d81062bbcafb98b3ffc35bb74dd160bcbe49ccad5eaf
                                            • Instruction ID: f555b2286040df4477e239727a4e90d3875fc2eba0b2ff5d31b901a9e1a15129
                                            • Opcode Fuzzy Hash: 593b7f8078e8e3006706d81062bbcafb98b3ffc35bb74dd160bcbe49ccad5eaf
                                            • Instruction Fuzzy Hash: 4011D376404284DFDB12CF54D5C4B56BF71FB84324F24C6A9D9090B617C33AE456CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384185678.00000000014BD000.00000040.00000001.sdmp, Offset: 014BD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9bc07e27ac38c6520d53d955b4da33624f675f1b5a16c324a4a69b08b2853fb
                                            • Instruction ID: 5d81e96d84ae4951a4c7226c8dcf99ce53fb76572a6ece712f3975ae8cb764d2
                                            • Opcode Fuzzy Hash: c9bc07e27ac38c6520d53d955b4da33624f675f1b5a16c324a4a69b08b2853fb
                                            • Instruction Fuzzy Hash: 0711BE75904280DFCB16CF54C5C0B56BF61FB84328F24C6AAD8494B766C33AD45ACB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.383751033.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28aa4114ee7340873309f6aae42e538e8275d8eee14e565267bdc1f31d9d20eb
                                            • Instruction ID: 9c6a2a054256dcb4d22f0efc551455515368a5479c5685b29647ad2fa5b6eda5
                                            • Opcode Fuzzy Hash: 28aa4114ee7340873309f6aae42e538e8275d8eee14e565267bdc1f31d9d20eb
                                            • Instruction Fuzzy Hash: BF0147310183C89BE7184EA5CDC4B66BF9CDF41334F18845AEA040B682C3789840CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.383751033.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2db601f0084cb2e2bcd27cbd8c7c571414005ee7ce8f8aa6b258141099cfbf40
                                            • Instruction ID: d1f9d54c9e935e6fd5120f7f5495d81cf43a8737e9c6ad34fc341c65805f91cc
                                            • Opcode Fuzzy Hash: 2db601f0084cb2e2bcd27cbd8c7c571414005ee7ce8f8aa6b258141099cfbf40
                                            • Instruction Fuzzy Hash: 11F062724043889BE7158E5ACDC4B62FF98EB81734F18C45AEE085B696C3799844CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 82c6be7748933de3798848025a0720a37230f7cf5667c3de6a5014bdff5ffab4
                                            • Instruction ID: b80e8f3cf893a7ce4179392a5dded2dd2da641aa5441cacce93f41edd6f63f89
                                            • Opcode Fuzzy Hash: 82c6be7748933de3798848025a0720a37230f7cf5667c3de6a5014bdff5ffab4
                                            • Instruction Fuzzy Hash: C012C5F94217468BD316CF66E89A1893FA9B755328F904308E2616FBD0DFB5314ACF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 83bdacb025c2eb4d060cda555c6ee918b0bc54b7772f8093b5d31a34f608ba5d
                                            • Instruction ID: 4327e47291d35a6954534a33eb112488bb02235b69730a9834dc03f226858b89
                                            • Opcode Fuzzy Hash: 83bdacb025c2eb4d060cda555c6ee918b0bc54b7772f8093b5d31a34f608ba5d
                                            • Instruction Fuzzy Hash: 65A18E32E1021A8FCF05DFB5C8945DEBBB6FF85300B15856AE905AF261EB31A905CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.384377852.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 61bfa4ba7d8f225fbcd0f0dd26782cdbdf0b9550fcfbaa05d93b7443e95b0c3c
                                            • Instruction ID: 911b7e2aca97af565591e00601b659e4aba73237bfe925561862085815e248ea
                                            • Opcode Fuzzy Hash: 61bfa4ba7d8f225fbcd0f0dd26782cdbdf0b9550fcfbaa05d93b7443e95b0c3c
                                            • Instruction Fuzzy Hash: FEC126B58217468AD715DF66E88A1897FB9BB95328F604308F2616F7D0DFB4304ACF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Executed Functions

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f537370c58baaf26dd78f1257f1e0b79c322ec3f6d4ea4775f656eee253e99de
                                            • Instruction ID: 58e9cc5a79b972dd60619902233584728523beb52dda60ad34f605741a2a94d1
                                            • Opcode Fuzzy Hash: f537370c58baaf26dd78f1257f1e0b79c322ec3f6d4ea4775f656eee253e99de
                                            • Instruction Fuzzy Hash: 87837E71D1475A9FCB11EB68C8546A9F7F1FF99300F15C6DAD448AB212EB30AAC4CB81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 103aa9fbaddf15a1339cc85d4892ed7a1a761e2d719eba0049c1d6da84ca1aa2
                                            • Instruction ID: fd9552de69558988a1f728934647cfb5d6e31ead3aaeab1433038148b8bb7ad7
                                            • Opcode Fuzzy Hash: 103aa9fbaddf15a1339cc85d4892ed7a1a761e2d719eba0049c1d6da84ca1aa2
                                            • Instruction Fuzzy Hash: BE53D770D1065A8ACB11EB68C984A99F7F1FF99300F15C7DAE5587B221EB70AAC4CF41
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3cbd560685f73b4e374f401f0fe8684cb04afeca7f53a4ac3674cc30572e773
                                            • Instruction ID: 2446cc3cb025800dca6aad89c267565477b24988531f0ae609befe7465ff5d69
                                            • Opcode Fuzzy Hash: b3cbd560685f73b4e374f401f0fe8684cb04afeca7f53a4ac3674cc30572e773
                                            • Instruction Fuzzy Hash: B9526E30A002198FCB14EFB4D8547ADBBF6AF88304F2584A9E54ADB395EF359C41CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 730f4471baa019d660c227d214548828cab94717c8475a80a3f1c3f2556c2cdc
                                            • Instruction ID: 3fa123a86eb83938080d5a31867e69df3550034b00e5dcb60a463d28516daad3
                                            • Opcode Fuzzy Hash: 730f4471baa019d660c227d214548828cab94717c8475a80a3f1c3f2556c2cdc
                                            • Instruction Fuzzy Hash: 1932A330F002159FCB14DBB8C994BAEB7F6AF84304F2585AAD516AB395EF35DC018791
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9673f7c6bc5eecaf32fdb4024ceb28b1ccfbcefeb201150831f2a5f2c8c8de7
                                            • Instruction ID: 620c5ed67c1b36d0de2ec211b2170fd428d7573c9c2f571baa0e44d569456ea8
                                            • Opcode Fuzzy Hash: d9673f7c6bc5eecaf32fdb4024ceb28b1ccfbcefeb201150831f2a5f2c8c8de7
                                            • Instruction Fuzzy Hash: FE02A330F002099FDB14DBA9D984BAEF7F2EF88304F1584AAE515AB395DB35EC418B51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d837a0644b1b38dfec92ec4ee26ae1fadb81636542124d32e3ac5d548b4b0ae
                                            • Instruction ID: fc98f5c36050ddcf352a835fd9e60ad301785431e9d0a1c948a9735d179598f0
                                            • Opcode Fuzzy Hash: 3d837a0644b1b38dfec92ec4ee26ae1fadb81636542124d32e3ac5d548b4b0ae
                                            • Instruction Fuzzy Hash: A4D1C130F002149FDB28EBB59854B6FB6E7AFC4304F24886DD12A9B388DF759C418796
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 013269A0
                                            • GetCurrentThread.KERNEL32 ref: 013269DD
                                            • GetCurrentProcess.KERNEL32 ref: 01326A1A
                                            • GetCurrentThreadId.KERNEL32 ref: 01326A73
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 1c3e809fafeff5b55c594b94843ecb50eb669357dd0df18f565b592fbaa53422
                                            • Instruction ID: a178f22ec6bd4c751890413faea4a30d74f66c331fe779c86e04fcb11336ff69
                                            • Opcode Fuzzy Hash: 1c3e809fafeff5b55c594b94843ecb50eb669357dd0df18f565b592fbaa53422
                                            • Instruction Fuzzy Hash: 205176B09006458FEB14DFA9DA49BDEBFF0EF48318F24886AD449A7390DB749944CF61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 013269A0
                                            • GetCurrentThread.KERNEL32 ref: 013269DD
                                            • GetCurrentProcess.KERNEL32 ref: 01326A1A
                                            • GetCurrentThreadId.KERNEL32 ref: 01326A73
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 12fbf9ba06bd44e38127ce16cd5c51ec1209bb7d5a4a8845e6b329aa99f3e561
                                            • Instruction ID: 3183e5056e0ba648e702572209615b4be3af0a9dc37a8b69b22548eaf278a068
                                            • Opcode Fuzzy Hash: 12fbf9ba06bd44e38127ce16cd5c51ec1209bb7d5a4a8845e6b329aa99f3e561
                                            • Instruction Fuzzy Hash: AB5144B0D102488FDB14DFAAD649BDEBFF0AF88318F208859E419A7350DB749844CF66
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 013251A2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 68992f51f8cfb41a105af42aff4bcb4eee7c26ac768eeb5c9249ef2396be7099
                                            • Instruction ID: 0372aa04de80cd767af5dadcb27f4534ec51c27d4b2c6c9b79bb690b676afb67
                                            • Opcode Fuzzy Hash: 68992f51f8cfb41a105af42aff4bcb4eee7c26ac768eeb5c9249ef2396be7099
                                            • Instruction Fuzzy Hash: 2651C1B1D103199FDF14CFA9C984ADEBFB5BF48314F24852AE819AB210D774A945CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 013251A2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 91ecde267bb455d8b82fb7a453751ee8a12a24fe3e931db342e3d435d34e8cc9
                                            • Instruction ID: 330dd3db57f95d2ba8bbc22e8da39af1f78701e5777775b53e4c8f7e7ec8f9e8
                                            • Opcode Fuzzy Hash: 91ecde267bb455d8b82fb7a453751ee8a12a24fe3e931db342e3d435d34e8cc9
                                            • Instruction Fuzzy Hash: 1941C0B1D103189FDF14CFAAC984ADEBFB5BF48314F24852AE819AB210D774A945CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 01327F01
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: 3cd12a92d1f5cbedcde8b8ce78b50e314e10c0d271d61cda4a48560e560a223d
                                            • Instruction ID: 6623826c58c9ffba759ec1cf0c44df77e8ad1743aada47b1371bea1fbfa05040
                                            • Opcode Fuzzy Hash: 3cd12a92d1f5cbedcde8b8ce78b50e314e10c0d271d61cda4a48560e560a223d
                                            • Instruction Fuzzy Hash: 7A413FB4900315DFDB14DF99C448A9ABBF5FF58318F248899E519A7321D734A845CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 0132C192
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: ad98bb5c7892659e93ec6f2f15dca0ee1db43c1a31d74b8e67a4889a07c74466
                                            • Instruction ID: 5498cadaaca721b387eee4ffe40c3f924cf463ea08957f97e121a81c581282e4
                                            • Opcode Fuzzy Hash: ad98bb5c7892659e93ec6f2f15dca0ee1db43c1a31d74b8e67a4889a07c74466
                                            • Instruction Fuzzy Hash: 2031E5B58053458FDB10EF69E94979EBFF8FF05328F24845AD448A7242CB796904CF61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01326BEF
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: cb303f34d9e2943ef330aad738ebb1ca7c16d0e952573a2bccc5a0985c0d2081
                                            • Instruction ID: 2f148dbff580ce7de48426fd514840f20d2fc734e2da1049f65c4ca792ac1ebd
                                            • Opcode Fuzzy Hash: cb303f34d9e2943ef330aad738ebb1ca7c16d0e952573a2bccc5a0985c0d2081
                                            • Instruction Fuzzy Hash: E42103B5D002489FDB10CFA9D985AEEBFF4EB48324F24842AE854A3310D338A954CF60
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01326BEF
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 9e5d2484c75b6d9d8a301aa24599ccce80da840e79689927c40213c524ff0c77
                                            • Instruction ID: 274ca359970bba156ba617ec025fcef3e3475d8b6606b337dc49cab381e90743
                                            • Opcode Fuzzy Hash: 9e5d2484c75b6d9d8a301aa24599ccce80da840e79689927c40213c524ff0c77
                                            • Instruction Fuzzy Hash: 7C21E4B5D002189FDB10CFAAD985ADEBBF8FB48324F14841AE914A3310D374A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 0132C192
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: 106acc52afa405e2d31ae215806d6c47a5d0861bf7663eb17f07d4fcadbc8db2
                                            • Instruction ID: c544d80731d837b90cd9cf8817cb675135a312a837e27ac9b23dd82cdc128abb
                                            • Opcode Fuzzy Hash: 106acc52afa405e2d31ae215806d6c47a5d0861bf7663eb17f07d4fcadbc8db2
                                            • Instruction Fuzzy Hash: C7113AB1D013198FDB10EFAAD9097AEBBF8FB44328F248429D405B3641DB796944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID: xm
                                            • API String ID: 0-3468872676
                                            • Opcode ID: fe19f779061f59dc9ee8c1a52fd00ed794689fdb40538c4da3971719e0d7c304
                                            • Instruction ID: cab9221e4ba4f1aab15fcf8ff1a1f6dd205575eb020c727020839e20da641f70
                                            • Opcode Fuzzy Hash: fe19f779061f59dc9ee8c1a52fd00ed794689fdb40538c4da3971719e0d7c304
                                            • Instruction Fuzzy Hash: F3A1D331B04215CFCB24AB65D458B6EB7EAEFC4354F2A44AAD502CB394EF39CC419792
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01324116
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: d56a0f9373c7ce544f23fdf91a04b200074e25526d8b4f6c2087bea423631467
                                            • Instruction ID: 05e86f44953457a6ff3de1b2f4845e21da17dee7e1080732e7797a523ae1e2d8
                                            • Opcode Fuzzy Hash: d56a0f9373c7ce544f23fdf91a04b200074e25526d8b4f6c2087bea423631467
                                            • Instruction Fuzzy Hash: A61123B5D002198BDB10DF9AC844BDEFBF4EB48224F20842AD419B7600D378A545CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01324116
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624595869.0000000001320000.00000040.00000001.sdmp, Offset: 01320000, based on PE: false
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 34c1a528be37a97030d7f01719c84feea91d389e5a2145e7ae9d196ef670ce80
                                            • Instruction ID: 24ef68ef22d5f45c44d6f335cdcc38bc45bf01c504a69e8be54c89832b15fb0e
                                            • Opcode Fuzzy Hash: 34c1a528be37a97030d7f01719c84feea91d389e5a2145e7ae9d196ef670ce80
                                            • Instruction Fuzzy Hash: AB110FB6D006198FDB10CFAAC944BDEFBF4AB48224F25846AC429B7600C778A545CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID: V
                                            • API String ID: 0-1342839628
                                            • Opcode ID: 14e9fa9f5b68b92b5a3a1bc9978e7859388b341cb2677476747470b65deb19da
                                            • Instruction ID: b917f991c493c2c27b6feb46b744f1342f4399c3e904fb2b058b8d7e1e22984a
                                            • Opcode Fuzzy Hash: 14e9fa9f5b68b92b5a3a1bc9978e7859388b341cb2677476747470b65deb19da
                                            • Instruction Fuzzy Hash: 3A51B430B042458FDB11EFB8E85476DBBF2AB85308F2581A6D549DB396EB34DC058B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID: V
                                            • API String ID: 0-1342839628
                                            • Opcode ID: 98d981076e6ffcee2d87529d595b6c47fb5e55ae673854e199c9688b1a1d2b17
                                            • Instruction ID: f2dba8aca1a0b9f64092efa86082332dd5d57f7d675c9cfd9575368a0252ad4f
                                            • Opcode Fuzzy Hash: 98d981076e6ffcee2d87529d595b6c47fb5e55ae673854e199c9688b1a1d2b17
                                            • Instruction Fuzzy Hash: AD41F330F043558FCB42EBB9D8486AD7BF1AF89304F1584EAD408DB396EB349C068B51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID: V
                                            • API String ID: 0-1342839628
                                            • Opcode ID: 89aa526509c2965db4d13e3a6ad02dbd2bfabb7b4b4c26e604abb98a7d274398
                                            • Instruction ID: 460a6e69a4a9a1ad11d52c86933a1b0f90ebcef1f42633fa8c20ca4dcdab9739
                                            • Opcode Fuzzy Hash: 89aa526509c2965db4d13e3a6ad02dbd2bfabb7b4b4c26e604abb98a7d274398
                                            • Instruction Fuzzy Hash: 36212630F042458FCB40EBB899056ADBBF1DB94314F2544BAC808EB385EA388C06C741
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID: V
                                            • API String ID: 0-1342839628
                                            • Opcode ID: 3bb596fe628d110537e7961c6be270e1271c79a36f8e395600c2dd80ada5aac2
                                            • Instruction ID: 513a8a7950e51e81cc63f2919244df594b3cd7a47a723a511761550780eda069
                                            • Opcode Fuzzy Hash: 3bb596fe628d110537e7961c6be270e1271c79a36f8e395600c2dd80ada5aac2
                                            • Instruction Fuzzy Hash: EA117335F005298FCB90EFF9D8449AEB7F2BB88300B108469D509E7358EB349D018B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7c3966038958d6fb845450fd6dda55756b1361f5da59a24bae3d9e88a834b66
                                            • Instruction ID: f6a59e88792cebb9c7b682783c316ac2804522445b2f038a6dbfdc80e2c23647
                                            • Opcode Fuzzy Hash: d7c3966038958d6fb845450fd6dda55756b1361f5da59a24bae3d9e88a834b66
                                            • Instruction Fuzzy Hash: 1FE18D30A052098FCB14EFB8D4546AEBBF2EF89304F2584AAD415DB399EB35DC46CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0fa3ab4e0f7da53b266a3072e3e58242e65845dbd6d9db113ec03c5384a6ab2f
                                            • Instruction ID: bacb422ac1597468e1c6efb331c0bc68d4eb66927b131e14df349589d6c768b3
                                            • Opcode Fuzzy Hash: 0fa3ab4e0f7da53b266a3072e3e58242e65845dbd6d9db113ec03c5384a6ab2f
                                            • Instruction Fuzzy Hash: 5EC10171B00215CFCB14DB69D494ABEBBEAEF84314F1684AEE416DB381EB35DC418B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47cc4e8acc64a7b42fa10506c7382dcd44dae282bfe2f80f26ba242a0274b74f
                                            • Instruction ID: 6a6f3f169591356be3eabc3ed3e3497010bc8af362d31af1f85d5239de5f6f92
                                            • Opcode Fuzzy Hash: 47cc4e8acc64a7b42fa10506c7382dcd44dae282bfe2f80f26ba242a0274b74f
                                            • Instruction Fuzzy Hash: 22317374B04215DFCB04EF75D844A6EB7F6EF88304B2145AAE506DB365EB349D01CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 023d86585646a75c9b2a923c6c8f6b0709a0fab5603d2ae21374f709ce708b62
                                            • Instruction ID: 78820e074d758e8b03b12aa2909b1861af358f0f0c957c35fe43edd85a6c8f3f
                                            • Opcode Fuzzy Hash: 023d86585646a75c9b2a923c6c8f6b0709a0fab5603d2ae21374f709ce708b62
                                            • Instruction Fuzzy Hash: D6212836F186508FD3069629A829B79BBD68F95311F0A80F7E815D7392FE24CC068761
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2f0f9baf43ca692ee56b2848a99601cb4132a8c862696d6c3ab8ce439040ae0a
                                            • Instruction ID: 26464d17da4f5a3a710028972b220c80d1c3c358be8ec88d74c3f02818211759
                                            • Opcode Fuzzy Hash: 2f0f9baf43ca692ee56b2848a99601cb4132a8c862696d6c3ab8ce439040ae0a
                                            • Instruction Fuzzy Hash: 7D31C575A592888FD705DB78C965B69BFF2AF4A301F1580EBE401DB3A2EA718C04C752
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d146eaf40da55f43a4e1a45051c2108b3e0dfbcf65388b1fc5a9801218f9c86
                                            • Instruction ID: b5e4b00dbee95f56b5ed6c5b91738585f9c6b486d0aca66d1bf25a832dc747e5
                                            • Opcode Fuzzy Hash: 7d146eaf40da55f43a4e1a45051c2108b3e0dfbcf65388b1fc5a9801218f9c86
                                            • Instruction Fuzzy Hash: 7A210635F042158FCB50EBB9E8446AEBBF1AF89304F1084BAD549DB346FA34DC068B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 748e8994ee84767fe27bd851c32f2f5682112699abf058ac668627e8f9adcc92
                                            • Instruction ID: f1181eca2d99501cf748942e8b1b1eb4187148d38c7fec9ebeac0d856cd51d6d
                                            • Opcode Fuzzy Hash: 748e8994ee84767fe27bd851c32f2f5682112699abf058ac668627e8f9adcc92
                                            • Instruction Fuzzy Hash: 7521F631F002158FCB80EBB9D854AAEBBF1AF89300F1481BAD549DB385EB348C06CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2f697231037b2b401a03d9e38e77286f8996db986ef28d91bca330e7a0adc070
                                            • Instruction ID: addccca3d3fca7c845319fabe89b0f71ac136833c6c7e49cd8ae5f26f297fdee
                                            • Opcode Fuzzy Hash: 2f697231037b2b401a03d9e38e77286f8996db986ef28d91bca330e7a0adc070
                                            • Instruction Fuzzy Hash: ED21B575F002198FCB40EFB9D8456AEB7F1BF88300F1584BAD549EB395EA349C028B51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85f9013676a0f88959e5f78ddcec6d94ef5ca6f6e4eee6b07741d58986387d83
                                            • Instruction ID: c1d63eb1140ac4f89821934ad4b0f4111c0eedc2d7a75792e01fbf71eb4dbbdb
                                            • Opcode Fuzzy Hash: 85f9013676a0f88959e5f78ddcec6d94ef5ca6f6e4eee6b07741d58986387d83
                                            • Instruction Fuzzy Hash: B721DA30B601085FDB14EB78C954BADB6E6EF88714F1481AAE501EB3E4EB718C008791
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624445887.000000000128D000.00000040.00000001.sdmp, Offset: 0128D000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 01387fc64529391cfe014acd394c643a1ceab49227be6e7b0236397191da50a6
                                            • Instruction ID: 2116e94d532536ef867c8e1c008253762c9af49efaa8bf57036fe4ce526b86b2
                                            • Opcode Fuzzy Hash: 01387fc64529391cfe014acd394c643a1ceab49227be6e7b0236397191da50a6
                                            • Instruction Fuzzy Hash: 23214571514208DFDB10EFA4D9C0B16BB65FB84364F20C9ADD9090B2C2C336D80BCB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.624445887.000000000128D000.00000040.00000001.sdmp, Offset: 0128D000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9bc07e27ac38c6520d53d955b4da33624f675f1b5a16c324a4a69b08b2853fb
                                            • Instruction ID: b27ef546dfd4cc66e49932cbb9e19c8b9b7630d4b0f16538dc89ceb583cd662c
                                            • Opcode Fuzzy Hash: c9bc07e27ac38c6520d53d955b4da33624f675f1b5a16c324a4a69b08b2853fb
                                            • Instruction Fuzzy Hash: 0F110075404284CFDB12CF14D5C0B15FF61FB44324F24C6A9D9094B696C33AD40BCB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 98666782f59bc4a8d43fbc448daadbaeec1d95bd8e10dab519ca421cd9faa869
                                            • Instruction ID: 6a195fffaebc2a43175e6539d0b5c72ef44afe7600d73e15f73fa12b1adc2b42
                                            • Opcode Fuzzy Hash: 98666782f59bc4a8d43fbc448daadbaeec1d95bd8e10dab519ca421cd9faa869
                                            • Instruction Fuzzy Hash: 5F116130F001298F8B90EFB9D8449AEB7F6FFC87507508569D509E7358EB34AD028B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91c6d28bad79f64402ee7792f1fd973f5540a6360980741a5e808328ba5309d6
                                            • Instruction ID: 9f96674ca9c09272dfda11f947c856b85033682ccb16cba6266183900c80c296
                                            • Opcode Fuzzy Hash: 91c6d28bad79f64402ee7792f1fd973f5540a6360980741a5e808328ba5309d6
                                            • Instruction Fuzzy Hash: 11116531F001298F8B90EFB9D8449AEB7F5FFC83107608569D509E7348EB349D018B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9361ca39d72aa8ed4c700b227b1b77990a5549744915a28bae90220a21f7a7a
                                            • Instruction ID: 9b8c7019fa658f5e038934e4a0e2e33d0953ee86b06d0da553fe570e3c21fbcd
                                            • Opcode Fuzzy Hash: f9361ca39d72aa8ed4c700b227b1b77990a5549744915a28bae90220a21f7a7a
                                            • Instruction Fuzzy Hash: 18115E31F101298F8B90FFB9D844AAEB7F6BF8C310B108469D509E7358EB34AD018B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b45f0ac8ce84f566e8d1bbd7f2879803483a915fb9d56fd55aa952424727dc89
                                            • Instruction ID: b8414eda65299b09f2cbab0d20856a352b4dc9cfece7f062952878cd59e98acd
                                            • Opcode Fuzzy Hash: b45f0ac8ce84f566e8d1bbd7f2879803483a915fb9d56fd55aa952424727dc89
                                            • Instruction Fuzzy Hash: 38112134F001298F8B50EFB9D8449EEB7F6FF88750B508469D509E7358EB34AD068B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb9bb08c6841baa780a4c9dc35fec05f9c47af25f49aa68c084bde3865bf3cba
                                            • Instruction ID: 3c873a978ce12cc71a61eea03d3ee806055303ea435b49fe701e7e46df5b5cb2
                                            • Opcode Fuzzy Hash: bb9bb08c6841baa780a4c9dc35fec05f9c47af25f49aa68c084bde3865bf3cba
                                            • Instruction Fuzzy Hash: 86115E31F001298F8B90FFB9D8449AEB7F6BF887107108469D509E7384EB34AD018B94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b49b288513bc6fbc50b3fb363ed613394cfdf46a9d3eff815eab63fa7030ff15
                                            • Instruction ID: 100a985507218795fa4d78e24e255d17018672e0f1763f60e3ab60607a552633
                                            • Opcode Fuzzy Hash: b49b288513bc6fbc50b3fb363ed613394cfdf46a9d3eff815eab63fa7030ff15
                                            • Instruction Fuzzy Hash: E9115E35F002298F8B50FFB9E8449AEB7F6BF887507608469D509E7348EB34AD018B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9210bf035815871c45f1aded85b275f6c343dc0a96a1b8171fabb103c5eac861
                                            • Instruction ID: f92e70f184116de010696f2230e2e844b5548e6515deaea199534ed9d74b8b1a
                                            • Opcode Fuzzy Hash: 9210bf035815871c45f1aded85b275f6c343dc0a96a1b8171fabb103c5eac861
                                            • Instruction Fuzzy Hash: B80180B5E01111CFC754EF7CE54896A7BF4EF4936571205A9E909EB310EB70CD008BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6177bbbf466b72fae9e356e9adc62238fb8ed15cf6bcca0720a768f0a9b198e
                                            • Instruction ID: 39e8e189e237ee0d4731b40670720bea99d1d9f414ab6d1d7f35127cec6a0800
                                            • Opcode Fuzzy Hash: b6177bbbf466b72fae9e356e9adc62238fb8ed15cf6bcca0720a768f0a9b198e
                                            • Instruction Fuzzy Hash: 2D01D670E046148FDB04EBB5E845BDDBBF6EB85304F1044AAD40067344DF755C048BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ada0ae2d9fa6c08c7e82d31e672d62c113214f4b4a5c5f7179ce3c3b3cfccf8c
                                            • Instruction ID: f5749950dccf8142e4689ba7ac4093676a2251582f0e4568961e3898e18703de
                                            • Opcode Fuzzy Hash: ada0ae2d9fa6c08c7e82d31e672d62c113214f4b4a5c5f7179ce3c3b3cfccf8c
                                            • Instruction Fuzzy Hash: 94011970E00229DFCF44EFB9D8406EEBBF5AF48304F10896AD519E7340EB7459018BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dc734c16b5317db89e56df7af4f52e3bb935e37824ce513315eb39c6ff45508b
                                            • Instruction ID: 9baf141988a3e614a6bbcb7d3a6a256f784d43b0c933465f832aa4ad50dda7c6
                                            • Opcode Fuzzy Hash: dc734c16b5317db89e56df7af4f52e3bb935e37824ce513315eb39c6ff45508b
                                            • Instruction Fuzzy Hash: 38E0ED35F0003A8B8F54FBB9D8945ED73E1EFC8254B1040A5D509E7354EE389C0187A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 156f7ae1315d25edbd2a896fe4d250780f453d78ceed376c1f08a150471a3160
                                            • Instruction ID: 586ff34fc83aa47cfe6f414515ff56a67669b5e8ecfcafba96ed8780392807b6
                                            • Opcode Fuzzy Hash: 156f7ae1315d25edbd2a896fe4d250780f453d78ceed376c1f08a150471a3160
                                            • Instruction Fuzzy Hash: 02E0C935B0012A8B8F50FBB9E8945DDB3E1AF88254B148065D505E7394EA349C018761
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8b164dc39f604f77ad934fccb76d37e868d009d68668e0253a8b2107bb9eebff
                                            • Instruction ID: 157e869832c07ab0ea33bee6e223cb6e4bfeed38e15212d5a2e651a94d7f4891
                                            • Opcode Fuzzy Hash: 8b164dc39f604f77ad934fccb76d37e868d009d68668e0253a8b2107bb9eebff
                                            • Instruction Fuzzy Hash: E4E0C936B1003A8B8F50FBF9D8946DDB3F2AF88259B1040A5D509E7354EA349C018761
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7757c0a2278e5e6d844b2156fe5c129d8c8bd1da2dd4fedca5d6db4a488e7edd
                                            • Instruction ID: 9f14ab815d2a5c29153f8c763c6d80f03197aa98a79a63dd1eaa7f47e3b60e77
                                            • Opcode Fuzzy Hash: 7757c0a2278e5e6d844b2156fe5c129d8c8bd1da2dd4fedca5d6db4a488e7edd
                                            • Instruction Fuzzy Hash: A6E0ED35F100398B8F50FBF9D8945DDB3E1BFC8254B144465D505E7394EE349C018BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53a8ca6247ebdcfc56db29afb8594e4d9e3e36d76ce03c48e18d75fc461ccfb9
                                            • Instruction ID: 1a99cafff1157a7cdd674bd6d9a64f4fd9188e8e16953c9131503bf5a1c5af18
                                            • Opcode Fuzzy Hash: 53a8ca6247ebdcfc56db29afb8594e4d9e3e36d76ce03c48e18d75fc461ccfb9
                                            • Instruction Fuzzy Hash: 32E0ED35F0003A8B8F50FBF9D4945DDB3E2EF88664B1044A5D505E7354EE389C0187A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7f8624a6c0170cfbd12745b1988c46806abdafc7211d101e1fa2a11c05ecb505
                                            • Instruction ID: af7533198681bfb26b2cb80e325144579fa26231ec971c5e21425370bf47fceb
                                            • Opcode Fuzzy Hash: 7f8624a6c0170cfbd12745b1988c46806abdafc7211d101e1fa2a11c05ecb505
                                            • Instruction Fuzzy Hash: E7E0ED35F0053A8BCF50FBF9E8945DDB3E1AF98258B108065D506E7354EE34AD018B61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.623195084.0000000000BD0000.00000040.00000001.sdmp, Offset: 00BD0000, based on PE: false
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51b192bccb0bd4f23ba6e8defa4bbd2c212d9f9d06968d2f3e610b3f4856993d
                                            • Instruction ID: cb8252fcc5b9731c68c59091e6387ebe98ef94d8c51a58d91e6e45cb97bf78b2
                                            • Opcode Fuzzy Hash: 51b192bccb0bd4f23ba6e8defa4bbd2c212d9f9d06968d2f3e610b3f4856993d
                                            • Instruction Fuzzy Hash: FAB0127AB4440007D308FF05DC1A92AE253ABE034CF16C95A595682320E730DC144262
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions