Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL - OVERDUE ACCOUNT - 130115482244.exe

Overview

General Information

Sample Name:DHL - OVERDUE ACCOUNT - 130115482244.exe
Analysis ID:635262
MD5:3aadebe9b94245452d74c655b2f04c0d
SHA1:794dc763ca693288850d9a8ab73848d8146e19a7
SHA256:d9005fbd977fd39146b129fb7e391765242be7857ba9dd921dc59339ce90d06d
Tags:AgentTeslaDHLexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Creates processes with suspicious names
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "ventas@mftecnologia.com.uy", "Password": "Ventas.1", "Host": "us2.smtp.mailhostbox.com"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000000.419459827.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32ae4:$s10: logins
                • 0x3254b:$s11: credential
                • 0x2eb48:$g1: get_Clipboard
                • 0x2eb56:$g2: get_Keyboard
                • 0x2eb63:$g3: get_Password
                • 0x2fe40:$g4: get_CtrlKeyDown
                • 0x2fe50:$g5: get_ShiftKeyDown
                • 0x2fe61:$g6: get_AltKeyDown
                0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "ventas@mftecnologia.com.uy", "Password": "Ventas.1", "Host": "us2.smtp.mailhostbox.com"}
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeVirustotal: Detection: 32%Perma Link
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeReversingLabs: Detection: 20%
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\cQsBHRkRnH\src\obj\x86\Debug\BadImageFormatExcept.pdb source: DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: Joe Sandbox ViewIP Address: 208.91.198.38 208.91.198.38
                    Source: global trafficTCP traffic: 192.168.2.6:49774 -> 208.91.198.38:587
                    Source: global trafficTCP traffic: 192.168.2.6:49774 -> 208.91.198.38:587
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://EBusCZ.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646171497.000000000179D000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000003.457152654.000000000179F000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646980534.0000000003543000.00000004.00000800.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646855464.0000000003513000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gmhwAFOW85IGv.org
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646171497.000000000179D000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000003.457152654.000000000179F000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com_/
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeString found in binary or memory: https://github.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeString found in binary or memory: https://github.com/dcoetzee/plants-vs-zombies-user-file-editor
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423191668.00000000015BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.7a40000.9.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.7a40000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 00000000.00000002.433764816.0000000007A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b2D7B5E04u002d9E20u002d4A39u002dAECCu002dF413E455BDF7u007d/u0035727597Fu002d90A1u002d476Bu002d838Fu002d3B50A6BAB817.csLarge array initialization: .cctor: array initializer size 11605
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007b2D7B5E04u002d9E20u002d4A39u002dAECCu002dF413E455BDF7u007d/u0035727597Fu002d90A1u002d476Bu002d838Fu002d3B50A6BAB817.csLarge array initialization: .cctor: array initializer size 11605
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b2D7B5E04u002d9E20u002d4A39u002dAECCu002dF413E455BDF7u007d/u0035727597Fu002d90A1u002d476Bu002d838Fu002d3B50A6BAB817.csLarge array initialization: .cctor: array initializer size 11605
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.7a40000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.7a40000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 00000000.00000002.433764816.0000000007A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 0_2_00D947140_2_00D94714
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 0_2_00D96CA50_2_00D96CA5
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_00F06CA51_2_00F06CA5
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_00F047141_2_00F04714
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0193F0801_2_0193F080
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0193F3C81_2_0193F3C8
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_019361201_2_01936120
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646B7181_2_0646B718
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646C4681_2_0646C468
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_06467EA21_2_06467EA2
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.422511334.0000000000E44000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBadImageFormatExcept.exe" vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.424115228.00000000031A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBMNuHOcWjgVEWdUIjWeMzsK.exe4 vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.433764816.0000000007A40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423191668.00000000015BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBMNuHOcWjgVEWdUIjWeMzsK.exe4 vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000000.420255488.0000000000FB4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBadImageFormatExcept.exe" vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBMNuHOcWjgVEWdUIjWeMzsK.exe4 vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.645714875.00000000016BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.645053288.0000000001358000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeBinary or memory string: OriginalFilenameBadImageFormatExcept.exe" vs DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeVirustotal: Detection: 32%
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeReversingLabs: Detection: 20%
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe"
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess created: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess created: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL - OVERDUE ACCOUNT - 130115482244.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\cQsBHRkRnH\src\obj\x86\Debug\BadImageFormatExcept.pdb source: DHL - OVERDUE ACCOUNT - 130115482244.exe
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_01935458 push ss; retf 5505h1_2_0193550E
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0193ADA9 pushfd ; retf 0005h1_2_0193ADAA
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646B660 push es; ret 1_2_0646B670
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646A609 push es; retf 1_2_0646A78C
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646A7D9 push es; retf 1_2_0646A7D8
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeCode function: 1_2_0646A7D9 push es; retf 1_2_0646A824
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.75351668715
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile created: \dhl - overdue account - 130115482244.exe
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile created: \dhl - overdue account - 130115482244.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.424115228.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 1700, type: MEMORYSTR
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.424115228.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.424115228.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe TID: 3108Thread sleep time: -43731s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe TID: 5336Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe TID: 4724Thread sleep count: 6469 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe TID: 4724Thread sleep count: 2274 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWindow / User API: threadDelayed 6469Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWindow / User API: threadDelayed 2274Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeThread delayed: delay time: 43731Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000003.457077099.000000000177E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlls gg
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeMemory written: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeProcess created: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.419459827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.420135063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.418939154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 1700, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 6220, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: Yara matchFile source: 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 6220, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.4279a48.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42e4488.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.42afe68.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.419459827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.420135063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.418939154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 1700, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DHL - OVERDUE ACCOUNT - 130115482244.exe PID: 6220, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain Credentials114
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DHL - OVERDUE ACCOUNT - 130115482244.exe33%VirustotalBrowse
                    DHL - OVERDUE ACCOUNT - 130115482244.exe20%ReversingLabsByteCode-MSIL.Spyware.Negasteal
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    1.2.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.DHL - OVERDUE ACCOUNT - 130115482244.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.fontbureau.coma0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.fontbureau.com_/0%Avira URL Cloudsafe
                    http://www.fontbureau.comgrita0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://EBusCZ.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://gmhwAFOW85IGv.org0%Avira URL Cloudsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.38
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/dcoetzee/plants-vs-zombies-user-file-editorDHL - OVERDUE ACCOUNT - 130115482244.exefalse
                              high
                              https://sectigo.com/CPS0DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/?DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://us2.smtp.mailhostbox.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.comDHL - OVERDUE ACCOUNT - 130115482244.exefalse
                                      high
                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.tiro.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comaDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comlDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cTheDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com_/DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          http://www.fontbureau.comgritaDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.423839638.0000000001817000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://EBusCZ.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://ocsp.sectigo.com0ADHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646099485.0000000001751000.00000004.00000020.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.647118757.000000000354D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fonts.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://gmhwAFOW85IGv.orgDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646980534.0000000003543000.00000004.00000800.00020000.00000000.sdmp, DHL - OVERDUE ACCOUNT - 130115482244.exe, 00000001.00000002.646855464.0000000003513000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.sakkal.comDHL - OVERDUE ACCOUNT - 130115482244.exe, 00000000.00000002.430878005.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                208.91.198.38
                                                us2.smtp.mailhostbox.comUnited States
                                                394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:635262
                                                Start date and time: 27/05/202218:03:412022-05-27 18:03:41 +02:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 10m 19s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:19
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 32
                                                • Number of non-executed functions: 2
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 20.223.24.244
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                18:05:07API Interceptor655x Sleep call for process: DHL - OVERDUE ACCOUNT - 130115482244.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                208.91.198.38SecuriteInfo.com.W32.AIDetectNet.01.3171.exeGet hashmaliciousBrowse
                                                  Purchase_order_#133.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.W32.AIDetectNet.01.20179.exeGet hashmaliciousBrowse
                                                      SecuriteInfo.com.W32.AIDetectNet.01.30938.exeGet hashmaliciousBrowse
                                                        Fattura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                                          XAo2MTzgXW.exeGet hashmaliciousBrowse
                                                            DOCX.exeGet hashmaliciousBrowse
                                                              wan6j8rMwQpe4SB.exeGet hashmaliciousBrowse
                                                                SWIFT COPY.exeGet hashmaliciousBrowse
                                                                  DHL AWB - INVOICE AND SHIPPING DOCUMENTS.exeGet hashmaliciousBrowse
                                                                    PO 18-3081.PDF.exeGet hashmaliciousBrowse
                                                                      PT.xlsxGet hashmaliciousBrowse
                                                                        MV SUNNY FAITHPORT & PDA INQUIRY.exeGet hashmaliciousBrowse
                                                                          MV. BAOSHAN SUCCESS V.MS220512_AGENT APPOINTMENT .docx.exeGet hashmaliciousBrowse
                                                                            MV REK KING_VESSEL DETAILS.pdf.exeGet hashmaliciousBrowse
                                                                              MV AVENIR TBN - VESSELS DESC.docx.exeGet hashmaliciousBrowse
                                                                                EPDA FOR VESSEL CALLING PULAU LAUT LOADING PALMS 25000MTS_pdf.exeGet hashmaliciousBrowse
                                                                                  MV. AVENIR TBN_VESSEL DETAILS.docx.exeGet hashmaliciousBrowse
                                                                                    MV. BRAVE SAILOR (V.1801) - AGENT NOMINATION(Bunkering Only)_pdf.exeGet hashmaliciousBrowse
                                                                                      PDA Query - 180397-05-16-22 Port Agency Appointment_pdf.exeGet hashmaliciousBrowse
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        us2.smtp.mailhostbox.comSecuriteInfo.com.W32.AIDetectNet.01.12288.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.3171.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.Trojan.PWS.StealerNET.122.28104.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.14190.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.11498.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        PO#5072.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.19565.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.16
                                                                                        SecuriteInfo.com.Trojan.PackedNET.1352.29751.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        Purchase_order_#133.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        PO-INQUIRY-VALE-SP-2022-60.pdf.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.20179.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.7467.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.30938.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.23081.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        Fattura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.Variant.MSILHeracles.38518.260.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.27311.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.16
                                                                                        DHL STATEMENT OF ACCOUNT - 1003674090.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.UDS.Trojan-PSW.MSIL.Agensla.gen.24372.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.16
                                                                                        DRAFT_dhl.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.16
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        PUBLIC-DOMAIN-REGISTRYUSINV00987890.exeGet hashmaliciousBrowse
                                                                                        • 162.215.253.210
                                                                                        6gIL6GLh9RGet hashmaliciousBrowse
                                                                                        • 119.18.52.5
                                                                                        SOA.exeGet hashmaliciousBrowse
                                                                                        • 111.118.215.27
                                                                                        G4tQVT2iUBOkX0S.exeGet hashmaliciousBrowse
                                                                                        • 162.215.253.210
                                                                                        Statement of Account (SOA).exeGet hashmaliciousBrowse
                                                                                        • 162.251.80.27
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.12288.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.3171.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SecuriteInfo.com.Trojan.PWS.StealerNET.122.28104.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.14190.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.11498.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        PO#5072.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.19565.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.16
                                                                                        SecuriteInfo.com.Trojan.PackedNET.1352.29751.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        http://6nreijjndg03nhn.tuarquetipo.com./#aHR0cHM6Ly93d3cuY3ZlZ2ozajg3LnRvcC8/ZW1haWw9YW1pdGFiaGEucmF5QHNjaHJlaWJlcmZvb2RzLmNvbQ==Get hashmaliciousBrowse
                                                                                        • 208.91.198.109
                                                                                        Purchase_order_#133.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        PO-INQUIRY-VALE-SP-2022-60.pdf.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.46
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.20179.exeGet hashmaliciousBrowse
                                                                                        • 208.91.198.38
                                                                                        SCAN Swift 054545676700000000000000001.exeGet hashmaliciousBrowse
                                                                                        • 103.211.219.10
                                                                                        SecuriteInfo.com.W32.AIDetectNet.01.7467.exeGet hashmaliciousBrowse
                                                                                        • 162.222.225.29
                                                                                        00012878667899DOC.exeGet hashmaliciousBrowse
                                                                                        • 162.215.253.210
                                                                                        No context
                                                                                        No context
                                                                                        Process:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1308
                                                                                        Entropy (8bit):5.345811588615766
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                                        MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                                        SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                                        SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                                        SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                                        Malicious:true
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.754894395538076
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        File name:DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                                                        File size:747520
                                                                                        MD5:3aadebe9b94245452d74c655b2f04c0d
                                                                                        SHA1:794dc763ca693288850d9a8ab73848d8146e19a7
                                                                                        SHA256:d9005fbd977fd39146b129fb7e391765242be7857ba9dd921dc59339ce90d06d
                                                                                        SHA512:976410c61688b601945b0c1af8c56dcee7c27726060349eefbfc068a1c66524c17a21a83529ce70d31662cbecba482e8e0fb6fc564b876db42a5990a2a45191c
                                                                                        SSDEEP:12288:ui782P9bHoAUgvqVBgbAj/ExhYs6sQ9szP+x1gGvZZtKIMolhR8rf7oHUdvp8+Ki:ht1bHoHgbAj/Exhb6v9szM11vZZ0IM6E
                                                                                        TLSH:3CF4F110B1F80F22E6BA57FD6570518407B67DA96520E38E1CD17CDB36B1F918A82F2B
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,J.b..............0......Z.......*... ...@....@.. ....................................@................................
                                                                                        Icon Hash:4462f276dcec30e6
                                                                                        Entrypoint:0x4b2ae2
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                        Time Stamp:0x62904A2C [Fri May 27 03:49:00 2022 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:v4.0.30319
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb2a900x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb40000x57e4.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb29580x1c.text
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000xb0ae80xb0c00False0.865699865187data7.75351668715IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xb40000x57e40x5800False0.965198863636data7.89347639679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xba0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_ICON0xb41000x51a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                        RT_GROUP_ICON0xb92b40x14data
                                                                                        RT_VERSION0xb92d80x30cdata
                                                                                        RT_MANIFEST0xb95f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        DescriptionData
                                                                                        Translation0x0000 0x04b0
                                                                                        LegalCopyright
                                                                                        Assembly Version1.0.0.0
                                                                                        InternalNameBadImageFormatExcept.exe
                                                                                        FileVersion1.0.0.0
                                                                                        CompanyName
                                                                                        LegalTrademarks
                                                                                        Comments
                                                                                        ProductName
                                                                                        ProductVersion1.0.0.0
                                                                                        FileDescription
                                                                                        OriginalFilenameBadImageFormatExcept.exe
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        May 27, 2022 18:05:28.091377020 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:28.298784971 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:28.298952103 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:29.684762955 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:29.703710079 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:29.911066055 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:29.911160946 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:29.967134953 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:30.174669981 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.285147905 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:30.493076086 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.493102074 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.493119001 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.493133068 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.493180037 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:30.493227959 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:30.496767998 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.631525993 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:30.700508118 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:30.803258896 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:31.011755943 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:31.225344896 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:31.911557913 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:32.119132042 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:32.164371967 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:32.372899055 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:32.522336006 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:33.591638088 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:33.801672935 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:33.818130970 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.028259039 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:34.028717995 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.259850025 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:34.260349989 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.469849110 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:34.471039057 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.471165895 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.471879959 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.471966028 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:05:34.678272009 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:34.678913116 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:34.827351093 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:05:35.022630930 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:07:07.958949089 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:07:08.166745901 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:07:08.167220116 CEST58749774208.91.198.38192.168.2.6
                                                                                        May 27, 2022 18:07:08.167516947 CEST49774587192.168.2.6208.91.198.38
                                                                                        May 27, 2022 18:07:08.170008898 CEST49774587192.168.2.6208.91.198.38
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        May 27, 2022 18:05:28.023284912 CEST6035053192.168.2.68.8.8.8
                                                                                        May 27, 2022 18:05:28.046868086 CEST53603508.8.8.8192.168.2.6
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                        May 27, 2022 18:05:28.023284912 CEST192.168.2.68.8.8.80xcd53Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                        May 27, 2022 18:05:28.046868086 CEST8.8.8.8192.168.2.60xcd53No error (0)us2.smtp.mailhostbox.com208.91.198.38A (IP address)IN (0x0001)
                                                                                        May 27, 2022 18:05:28.046868086 CEST8.8.8.8192.168.2.60xcd53No error (0)us2.smtp.mailhostbox.com208.91.198.46A (IP address)IN (0x0001)
                                                                                        May 27, 2022 18:05:28.046868086 CEST8.8.8.8192.168.2.60xcd53No error (0)us2.smtp.mailhostbox.com162.222.225.29A (IP address)IN (0x0001)
                                                                                        May 27, 2022 18:05:28.046868086 CEST8.8.8.8192.168.2.60xcd53No error (0)us2.smtp.mailhostbox.com162.222.225.16A (IP address)IN (0x0001)
                                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                                        May 27, 2022 18:05:29.684762955 CEST58749774208.91.198.38192.168.2.6220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                                        May 27, 2022 18:05:29.703710079 CEST49774587192.168.2.6208.91.198.38EHLO 134349
                                                                                        May 27, 2022 18:05:29.911160946 CEST58749774208.91.198.38192.168.2.6250-us2.outbound.mailhostbox.com
                                                                                        250-PIPELINING
                                                                                        250-SIZE 41648128
                                                                                        250-VRFY
                                                                                        250-ETRN
                                                                                        250-STARTTLS
                                                                                        250-AUTH PLAIN LOGIN
                                                                                        250-AUTH=PLAIN LOGIN
                                                                                        250-ENHANCEDSTATUSCODES
                                                                                        250-8BITMIME
                                                                                        250-DSN
                                                                                        250 CHUNKING
                                                                                        May 27, 2022 18:05:29.967134953 CEST49774587192.168.2.6208.91.198.38STARTTLS
                                                                                        May 27, 2022 18:05:30.174669981 CEST58749774208.91.198.38192.168.2.6220 2.0.0 Ready to start TLS

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:18:04:55
                                                                                        Start date:27/05/2022
                                                                                        Path:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe"
                                                                                        Imagebase:0xd90000
                                                                                        File size:747520 bytes
                                                                                        MD5 hash:3AADEBE9B94245452D74C655B2F04C0D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.433764816.0000000007A40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.424115228.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.425042726.0000000003270000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.428041708.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        Target ID:1
                                                                                        Start time:18:05:15
                                                                                        Start date:27/05/2022
                                                                                        Path:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT - 130115482244.exe
                                                                                        Imagebase:0xf00000
                                                                                        File size:747520 bytes
                                                                                        MD5 hash:3AADEBE9B94245452D74C655B2F04C0D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.420640504.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.644568588.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.419459827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.419459827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.420135063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.420135063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.418939154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.418939154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.646349174.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:12.4%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:94
                                                                                          Total number of Limit Nodes:5
                                                                                          execution_graph 8886 15a40d0 8887 15a40e2 8886->8887 8888 15a40ee 8887->8888 8892 15a41e0 8887->8892 8897 15a3894 8888->8897 8890 15a410d 8893 15a4205 8892->8893 8901 15a42e0 8893->8901 8905 15a42d0 8893->8905 8898 15a389f 8897->8898 8913 15a58cc 8898->8913 8900 15a7555 8900->8890 8902 15a4307 8901->8902 8903 15a43e4 8902->8903 8909 15a3e94 8902->8909 8906 15a42da 8905->8906 8907 15a43e4 8906->8907 8908 15a3e94 CreateActCtxA 8906->8908 8908->8907 8910 15a5370 CreateActCtxA 8909->8910 8912 15a5433 8910->8912 8914 15a58d7 8913->8914 8917 15a722c 8914->8917 8916 15a76b5 8916->8900 8918 15a7237 8917->8918 8921 15a725c 8918->8921 8920 15a779a 8920->8916 8922 15a7267 8921->8922 8925 15a728c 8922->8925 8924 15a788a 8924->8920 8926 15a7297 8925->8926 8927 15a7f9e 8926->8927 8931 15a9d58 8926->8931 8928 15a7fdc 8927->8928 8935 15abec0 8927->8935 8928->8924 8940 15aa198 8931->8940 8943 15aa189 8931->8943 8932 15a9d6e 8932->8927 8936 15abee1 8935->8936 8937 15abf05 8936->8937 8967 15ac478 8936->8967 8971 15ac468 8936->8971 8937->8928 8947 15aa290 8940->8947 8941 15aa1a7 8941->8932 8944 15aa198 8943->8944 8946 15aa290 2 API calls 8944->8946 8945 15aa1a7 8945->8932 8946->8945 8948 15aa2a3 8947->8948 8949 15aa2bb 8948->8949 8955 15aa518 8948->8955 8959 15aa508 8948->8959 8949->8941 8950 15aa4b8 GetModuleHandleW 8952 15aa4e5 8950->8952 8951 15aa2b3 8951->8949 8951->8950 8952->8941 8956 15aa52c 8955->8956 8957 15aa551 8956->8957 8963 15a9f80 8956->8963 8957->8951 8960 15aa518 8959->8960 8961 15aa551 8960->8961 8962 15a9f80 LoadLibraryExW 8960->8962 8961->8951 8962->8961 8964 15aa6f8 LoadLibraryExW 8963->8964 8966 15aa771 8964->8966 8966->8957 8968 15ac485 8967->8968 8969 15ac4bf 8968->8969 8975 15ac26c 8968->8975 8969->8937 8972 15ac439 8971->8972 8972->8971 8973 15ac4bf 8972->8973 8974 15ac26c 2 API calls 8972->8974 8973->8937 8974->8973 8976 15ac277 8975->8976 8978 15acdb0 8976->8978 8979 15ac354 8976->8979 8978->8978 8980 15ac35f 8979->8980 8981 15a728c 2 API calls 8980->8981 8982 15ace1f 8981->8982 8986 15aeba0 8982->8986 8990 15aebb8 8982->8990 8983 15ace58 8983->8978 8987 15aebb8 8986->8987 8988 15aebf5 8987->8988 8989 15af038 LoadLibraryExW GetModuleHandleW 8987->8989 8988->8983 8989->8988 8992 15aebe9 8990->8992 8993 15aec35 8990->8993 8991 15aebf5 8991->8983 8992->8991 8994 15af038 LoadLibraryExW GetModuleHandleW 8992->8994 8993->8983 8994->8993 8995 15ac590 8996 15ac5f6 8995->8996 8997 15ac6a5 8996->8997 9000 15ac750 8996->9000 9003 15ac740 8996->9003 9007 15ac2f4 9000->9007 9004 15ac750 9003->9004 9005 15ac2f4 DuplicateHandle 9004->9005 9006 15ac77e 9005->9006 9006->8997 9008 15ac7b8 DuplicateHandle 9007->9008 9009 15ac77e 9008->9009 9009->8997

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 015AA4D6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 3098f5020298e00a293146b132ff9554f60860203c52f5e183d5a7938bf6bdc4
                                                                                          • Instruction ID: 437d7f08a470cba544666af8bdf5f8eec7d9c956318db7e2cb4aaf1db79368e7
                                                                                          • Opcode Fuzzy Hash: 3098f5020298e00a293146b132ff9554f60860203c52f5e183d5a7938bf6bdc4
                                                                                          • Instruction Fuzzy Hash: B6712170A00B058FD725DF6AC1407AEBBF1BF88204F408A2AD54ADBB40DB75E849CF91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 56 15a3e94-15a5431 CreateActCtxA 59 15a543a-15a5494 56->59 60 15a5433-15a5439 56->60 67 15a54a3-15a54a7 59->67 68 15a5496-15a5499 59->68 60->59 69 15a54b8 67->69 70 15a54a9-15a54b5 67->70 68->67 70->69
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 015A5421
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 3a480846586ebd96e717e79388021e06a44f3b3a756201616db1e5fa46ecb117
                                                                                          • Instruction ID: 11b13ac58908717859129bf260d4062159b91e213c63d3360d2102a0ddeb680d
                                                                                          • Opcode Fuzzy Hash: 3a480846586ebd96e717e79388021e06a44f3b3a756201616db1e5fa46ecb117
                                                                                          • Instruction Fuzzy Hash: 1C41D171D1871CCBDB24CFA9C984B9EBBF1BF49308F508059D508AB250DB756989CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 72 15ac2f4-15ac84c DuplicateHandle 74 15ac84e-15ac854 72->74 75 15ac855-15ac872 72->75 74->75
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015AC77E,?,?,?,?,?), ref: 015AC83F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: d2575706b233a14674e72dbdb3e8c45931fbfda6d8f80799599516578b448eb4
                                                                                          • Instruction ID: f5f23a750dab43b2b3915db56ba95a980bd5d2b58bde215d87c6724340b14933
                                                                                          • Opcode Fuzzy Hash: d2575706b233a14674e72dbdb3e8c45931fbfda6d8f80799599516578b448eb4
                                                                                          • Instruction Fuzzy Hash: 8321E3B5904249AFDB10CF99D584ADEBBF8FB48320F54841AE914A7710D378A954CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 78 15ac7b1-15ac7b2 79 15ac7b8-15ac84c DuplicateHandle 78->79 80 15ac84e-15ac854 79->80 81 15ac855-15ac872 79->81 80->81
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015AC77E,?,?,?,?,?), ref: 015AC83F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 25d518f3b7d2ade5be2002e32a8b60951df68311f2e4a8264785f1e178cf7a80
                                                                                          • Instruction ID: e4636e84e8f6977d2f4f2f2d2f7b8b8d841de9d1243182fede3dde7fa9239c29
                                                                                          • Opcode Fuzzy Hash: 25d518f3b7d2ade5be2002e32a8b60951df68311f2e4a8264785f1e178cf7a80
                                                                                          • Instruction Fuzzy Hash: 8821E3B59042499FDB10CFA9D584ADEBBF8FB48320F14841AE914A7310D378A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 84 15a9f80-15aa738 86 15aa73a-15aa73d 84->86 87 15aa740-15aa76f LoadLibraryExW 84->87 86->87 88 15aa778-15aa795 87->88 89 15aa771-15aa777 87->89 89->88
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015AA551,00000800,00000000,00000000), ref: 015AA762
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 1e1ee07175a865ad4524737861b9f51a14c85e8d7141b7d4586df709894b2581
                                                                                          • Instruction ID: 2b58912952a3ce4b5c68273ea34554d15a125fa2fc76602635e182dfb84fb5ab
                                                                                          • Opcode Fuzzy Hash: 1e1ee07175a865ad4524737861b9f51a14c85e8d7141b7d4586df709894b2581
                                                                                          • Instruction Fuzzy Hash: 871106B59042498FDB10CF9AC544AEEFBF4AB98350F44841ED515AB600C375A549CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 92 15aa6f1-15aa738 94 15aa73a-15aa73d 92->94 95 15aa740-15aa76f LoadLibraryExW 92->95 94->95 96 15aa778-15aa795 95->96 97 15aa771-15aa777 95->97 97->96
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015AA551,00000800,00000000,00000000), ref: 015AA762
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 550bbe6d520152ddb761ef10fe26465cc019f096ad271f7e1c4451051e0380aa
                                                                                          • Instruction ID: 5f9c98e32afc6c075cbe4914b0dceb75f71918fac75086ab99611bbfab0cc3af
                                                                                          • Opcode Fuzzy Hash: 550bbe6d520152ddb761ef10fe26465cc019f096ad271f7e1c4451051e0380aa
                                                                                          • Instruction Fuzzy Hash: DE1114B6D042498FDB10CF9AC584BDEFBF4AB98320F04841ED915AB600C379A549CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 100 15aa470-15aa4b0 101 15aa4b8-15aa4e3 GetModuleHandleW 100->101 102 15aa4b2-15aa4b5 100->102 103 15aa4ec-15aa500 101->103 104 15aa4e5-15aa4eb 101->104 102->101 104->103
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 015AA4D6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.423117311.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_15a0000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: bfec99a53fa0d5df5fdbe1f0704b8381d088bd94fa879cea1a7ba648e7ade57c
                                                                                          • Instruction ID: 33e9a0a08c814a772f3e1d5859ee4d10b77bc42a4b29d3333591b41854c4bd28
                                                                                          • Opcode Fuzzy Hash: bfec99a53fa0d5df5fdbe1f0704b8381d088bd94fa879cea1a7ba648e7ade57c
                                                                                          • Instruction Fuzzy Hash: 6D11E0B5D046498FDB20CF9AD448BDEFBF4AF88324F14841AD919BB600C379A549CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6bf70fe682e4a9d04fc92384dc8893d360de0c880003570692050b542e895bad
                                                                                          • Instruction ID: 79cba8e5503ba0039500244feb85b2a20c006e9eb059b46f49639e9b7a17dca4
                                                                                          • Opcode Fuzzy Hash: 6bf70fe682e4a9d04fc92384dc8893d360de0c880003570692050b542e895bad
                                                                                          • Instruction Fuzzy Hash: 4A2106B1504244DFDB02DFD4D9C0B6ABBB5FB84324F25C569E9054F286C376E846C7A2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ad9f6b67d04d0f277138979a4e3a9c8dbc05175ef70988d90f4bef851294e9f7
                                                                                          • Instruction ID: 633a0399d65b9375f7169f57ec48454f3c0550f5533e41aa99daecd869baabec
                                                                                          • Opcode Fuzzy Hash: ad9f6b67d04d0f277138979a4e3a9c8dbc05175ef70988d90f4bef851294e9f7
                                                                                          • Instruction Fuzzy Hash: A521F1B1504240DFDB12DFD4D9C0B2ABBB5FB88328F248969ED054F286C336D846CAA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422935712.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_151d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2a29477a8b72f397431f671bfd735b0bd1eb4dec0091e9bda8f43c975c1e0ef8
                                                                                          • Instruction ID: b98d12d6ebd41f58f98b47a6efcc229deeb3af0a7943f3ac3a89fd11b5456487
                                                                                          • Opcode Fuzzy Hash: 2a29477a8b72f397431f671bfd735b0bd1eb4dec0091e9bda8f43c975c1e0ef8
                                                                                          • Instruction Fuzzy Hash: 2A213771504240EFEB02DF94D5C4B6ABBB1FB84324F24CA6DE9194F24AC33AD846CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422935712.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_151d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e46de28bf24d8df5a08d0d035ba322e7316ac76b7a154056efc12bfa136c548d
                                                                                          • Instruction ID: 150ba0698bb205eacf8f7902dba660d15e3a6a03ee0b8891a733716c5a767173
                                                                                          • Opcode Fuzzy Hash: e46de28bf24d8df5a08d0d035ba322e7316ac76b7a154056efc12bfa136c548d
                                                                                          • Instruction Fuzzy Hash: D4214575508240DFEB12CF54D9C8B2ABBB1FB84354F20C96DD8094F24AD33AD847CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422935712.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_151d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 11e414125024449a6925bd802e90f2d61c529f9d084211a4af287a8e17a6820e
                                                                                          • Instruction ID: 790218197865616973f7c1c84f838f95389c2dc60e83391578dcbbe95f678451
                                                                                          • Opcode Fuzzy Hash: 11e414125024449a6925bd802e90f2d61c529f9d084211a4af287a8e17a6820e
                                                                                          • Instruction Fuzzy Hash: 7A219F755093808FDB03CF24D994B15BF71FB46214F28C5EAD8498F6A7C33A984ACB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 198e17f6d9c70b7d811e6863bb39faee6fab7807c011b6c82d5115958b253fe2
                                                                                          • Instruction ID: c859289f2ddae67efffe11863511ba2f263b602b63cdc03c684bc1a6fd2fea1f
                                                                                          • Opcode Fuzzy Hash: 198e17f6d9c70b7d811e6863bb39faee6fab7807c011b6c82d5115958b253fe2
                                                                                          • Instruction Fuzzy Hash: A311DF72404280CFCB02CF84D5C0B5ABF71FB84320F24C6A9D8090B656C33AE45ACBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 198e17f6d9c70b7d811e6863bb39faee6fab7807c011b6c82d5115958b253fe2
                                                                                          • Instruction ID: c8140702c7814f29aca205b4f623eb2a598736be5a05d394f318d4f9ab2d25ca
                                                                                          • Opcode Fuzzy Hash: 198e17f6d9c70b7d811e6863bb39faee6fab7807c011b6c82d5115958b253fe2
                                                                                          • Instruction Fuzzy Hash: 3311AF76904280CFCB12CF94D5C4B1ABF71FB88324F24C6A9DC450B656C33AD45ACBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422935712.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_151d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: df7c3f96c3ea33a8ec213620a0869993b5895d7dc175659c39616cfcb16a96ec
                                                                                          • Instruction ID: 4a567d1c0deb1013177806bde8caaba27d2494dd106a361bc23639162d5ae97e
                                                                                          • Opcode Fuzzy Hash: df7c3f96c3ea33a8ec213620a0869993b5895d7dc175659c39616cfcb16a96ec
                                                                                          • Instruction Fuzzy Hash: B111BB75904280DFDB02CF54C5C4B59FBB1FB84224F28C6ADD8594B65AC33AD44ACB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b93b8019a49bbde4ee5eec333e698562524b4c2a953849255187a3e262ccbd27
                                                                                          • Instruction ID: c5a605e011bf3efab58374112e3c2b26601adb5c5375b73c9c3b77a5bc3e2356
                                                                                          • Opcode Fuzzy Hash: b93b8019a49bbde4ee5eec333e698562524b4c2a953849255187a3e262ccbd27
                                                                                          • Instruction Fuzzy Hash: 0701F7715083C09AE7124ED9CD84B6AFBE8FF41278F08891AEA045F6C7D7799444C6B1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422887304.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_150d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d054540a4f8707aa4098c76bf0d956a77a1238560083fbd72e26fd9c3f64563b
                                                                                          • Instruction ID: eef040e2e99051924eef607738c4b98617fb05395a7bee947d23e3d051deda8e
                                                                                          • Opcode Fuzzy Hash: d054540a4f8707aa4098c76bf0d956a77a1238560083fbd72e26fd9c3f64563b
                                                                                          • Instruction Fuzzy Hash: 50F0C2714042849EE7118E99CC84B66FFA8EF81274F18C05AED085F286C3789844CAB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422284685.0000000000D92000.00000002.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.422275729.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.422511334.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d90000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0f790a579cb1aedc3656fc1eea107f801ba3b207fa01ea4363a3d382caa26087
                                                                                          • Instruction ID: a2271949e0accbe5487e0c163b3dba55811083bd6677540a1a57a47397f83973
                                                                                          • Opcode Fuzzy Hash: 0f790a579cb1aedc3656fc1eea107f801ba3b207fa01ea4363a3d382caa26087
                                                                                          • Instruction Fuzzy Hash: 2423AD5151E7C29FDB074BB89DB5194BFB09E6721435E48C3C0C0CF0A7E61869AAEB36
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.422284685.0000000000D92000.00000002.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                                          • Associated: 00000000.00000002.422275729.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.422511334.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d90000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 82a1b747d15638d326914b2ea872912bbd957c186232a95a794e8d259fd9c0b3
                                                                                          • Instruction ID: 5087b2ae0b02ecaa52fe7723efea7996c778171122001bfdd5510f46bdefdb9a
                                                                                          • Opcode Fuzzy Hash: 82a1b747d15638d326914b2ea872912bbd957c186232a95a794e8d259fd9c0b3
                                                                                          • Instruction Fuzzy Hash: C3C206A240E3C28FCB134B789CB55917FB1AE6721871E05DBC4C0CF1A7E219995BDB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:15.6%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:85
                                                                                          Total number of Limit Nodes:1
                                                                                          execution_graph 20390 193add0 20391 193adee 20390->20391 20394 1939dc0 20391->20394 20393 193ae25 20395 193c8f0 LoadLibraryA 20394->20395 20397 193c9cc 20395->20397 20463 1934540 20464 1934541 20463->20464 20467 193478a 20464->20467 20465 193455d 20468 1934793 20467->20468 20473 1934870 20467->20473 20478 193496c 20467->20478 20483 193485f 20467->20483 20488 1934986 20467->20488 20468->20465 20474 1934871 20473->20474 20475 19349ab 20474->20475 20493 1934c67 20474->20493 20498 1934c78 20474->20498 20479 193491f 20478->20479 20479->20478 20480 19349ab 20479->20480 20481 1934c67 2 API calls 20479->20481 20482 1934c78 2 API calls 20479->20482 20481->20480 20482->20480 20484 1934864 20483->20484 20485 19349ab 20484->20485 20486 1934c67 2 API calls 20484->20486 20487 1934c78 2 API calls 20484->20487 20486->20485 20487->20485 20489 1934999 20488->20489 20490 19349ab 20488->20490 20491 1934c67 2 API calls 20489->20491 20492 1934c78 2 API calls 20489->20492 20491->20490 20492->20490 20494 1934c86 20493->20494 20503 1934cb8 20494->20503 20507 1934cc8 20494->20507 20495 1934c96 20495->20475 20499 1934c86 20498->20499 20501 1934cb8 RtlEncodePointer 20499->20501 20502 1934cc8 RtlEncodePointer 20499->20502 20500 1934c96 20500->20475 20501->20500 20502->20500 20504 1934d02 20503->20504 20505 1934d2c RtlEncodePointer 20504->20505 20506 1934d55 20504->20506 20505->20506 20506->20495 20508 1934d02 20507->20508 20509 1934d2c RtlEncodePointer 20508->20509 20510 1934d55 20508->20510 20509->20510 20510->20495 20398 64661e0 20400 64661e9 20398->20400 20399 64662dd 20400->20399 20402 64662f8 20400->20402 20403 6466317 20402->20403 20404 646633f 20403->20404 20413 64676f7 20403->20413 20419 6467669 20403->20419 20425 646777c 20403->20425 20431 64676b0 20403->20431 20437 64677c3 20403->20437 20443 6467052 20403->20443 20451 6467622 20403->20451 20457 6467735 20403->20457 20414 6467709 KiUserExceptionDispatcher 20413->20414 20416 6467852 KiUserExceptionDispatcher 20414->20416 20418 6467a71 20416->20418 20418->20404 20420 646767b KiUserExceptionDispatcher 20419->20420 20422 6467852 KiUserExceptionDispatcher 20420->20422 20424 6467a71 20422->20424 20424->20404 20426 646778e KiUserExceptionDispatcher 20425->20426 20428 6467852 KiUserExceptionDispatcher 20426->20428 20430 6467a71 20428->20430 20430->20404 20432 64676c2 KiUserExceptionDispatcher 20431->20432 20434 6467852 KiUserExceptionDispatcher 20432->20434 20436 6467a71 20434->20436 20436->20404 20438 64677d5 KiUserExceptionDispatcher 20437->20438 20440 6467852 KiUserExceptionDispatcher 20438->20440 20442 6467a71 20440->20442 20442->20404 20444 6467058 20443->20444 20445 64673d2 KiUserExceptionDispatcher 20444->20445 20446 64673f1 KiUserExceptionDispatcher 20445->20446 20448 6467852 KiUserExceptionDispatcher 20446->20448 20450 6467a71 20448->20450 20450->20404 20452 6467634 KiUserExceptionDispatcher 20451->20452 20454 6467852 KiUserExceptionDispatcher 20452->20454 20456 6467a71 20454->20456 20456->20404 20458 6467747 KiUserExceptionDispatcher 20457->20458 20460 6467852 KiUserExceptionDispatcher 20458->20460 20462 6467a71 20460->20462 20462->20404

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 193c8e4-193c947 1 193c980-193c9ca LoadLibraryA 0->1 2 193c949-193c953 0->2 9 193c9d3-193ca04 1->9 10 193c9cc-193c9d2 1->10 2->1 3 193c955-193c957 2->3 4 193c97a-193c97d 3->4 5 193c959-193c963 3->5 4->1 7 193c967-193c976 5->7 8 193c965 5->8 7->7 11 193c978 7->11 8->7 14 193ca06-193ca0a 9->14 15 193ca14 9->15 10->9 11->4 14->15 16 193ca0c 14->16 17 193ca15 15->17 16->15 17->17
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 0193C9BA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.646271813.0000000001930000.00000040.00000800.00020000.00000000.sdmp, Offset: 01930000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_1930000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: [kn$[kn
                                                                                          • API String ID: 1029625771-128697294
                                                                                          • Opcode ID: df78218b79d590557d4c4045683f71bde08c80c3497f76c0bbacad5dd7d6a22f
                                                                                          • Instruction ID: 3486460ade2741c746c3bbea430327b35d302bb69dea6e40de5af25eb7c33a1a
                                                                                          • Opcode Fuzzy Hash: df78218b79d590557d4c4045683f71bde08c80c3497f76c0bbacad5dd7d6a22f
                                                                                          • Instruction Fuzzy Hash: 863145B0D046499FDB14CFA8C885BDEBBB1BB48314F15852AE85AB7340D7749886CF91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 18 1939dc0-193c947 20 193c980-193c9ca LoadLibraryA 18->20 21 193c949-193c953 18->21 28 193c9d3-193ca04 20->28 29 193c9cc-193c9d2 20->29 21->20 22 193c955-193c957 21->22 23 193c97a-193c97d 22->23 24 193c959-193c963 22->24 23->20 26 193c967-193c976 24->26 27 193c965 24->27 26->26 30 193c978 26->30 27->26 33 193ca06-193ca0a 28->33 34 193ca14 28->34 29->28 30->23 33->34 35 193ca0c 33->35 36 193ca15 34->36 35->34 36->36
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 0193C9BA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.646271813.0000000001930000.00000040.00000800.00020000.00000000.sdmp, Offset: 01930000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_1930000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: [kn$[kn
                                                                                          • API String ID: 1029625771-128697294
                                                                                          • Opcode ID: c9ce9f02fc9a544e29e811b9f2e72ec7eb63b879887b0f292477855c5f932875
                                                                                          • Instruction ID: 576f3dd65fe5362242a90ef443bd089ec18a0edcf1de2da01694634fa6a647e0
                                                                                          • Opcode Fuzzy Hash: c9ce9f02fc9a544e29e811b9f2e72ec7eb63b879887b0f292477855c5f932875
                                                                                          • Instruction Fuzzy Hash: 7E3134B0D04A499FDB14CFA8C88579EBBF1AB48314F15852AE819B7380D7749846CF91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 37 6467052-646711e 180 646711e call 193fc98 37->180 181 646711e call 193fc88 37->181 47 6467124-64671f3 call 646f1c0 183 64671f3 call 646f730 47->183 184 64671f3 call 646f7e0 47->184 56 64671f9-6467d74 KiUserExceptionDispatcher * 3 177 6467d7a-6467dbf 56->177 180->47 181->47 183->56 184->56
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 064673D2
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 01ab85c933e2382c115104f41c67e652ee6324f35ba5976905b65306196a552d
                                                                                          • Instruction ID: 37f8857f8b3fbfaff2eeed53a4444c74772defd68edd4f030e356765d51cdfc2
                                                                                          • Opcode Fuzzy Hash: 01ab85c933e2382c115104f41c67e652ee6324f35ba5976905b65306196a552d
                                                                                          • Instruction Fuzzy Hash: 2402CC38902398CFDBA5DF70D8886A9B7B2FF59709F1041EAD50A52350DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 185 1934cb8-1934d0a 188 1934d10 185->188 189 1934d0c-1934d0e 185->189 190 1934d15-1934d20 188->190 189->190 191 1934d22-1934d53 RtlEncodePointer 190->191 192 1934d81-1934d8e 190->192 194 1934d55-1934d5b 191->194 195 1934d5c-1934d7c 191->195 194->195 195->192
                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 01934D42
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.646271813.0000000001930000.00000040.00000800.00020000.00000000.sdmp, Offset: 01930000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_1930000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: [kn
                                                                                          • API String ID: 2118026453-2182507298
                                                                                          • Opcode ID: 6b587ac2bf0a18ae1e1da40103b6ce1b1f6671fc227593c1177dfa3dba33bc05
                                                                                          • Instruction ID: 377243927ec7a5671872662f5f4f5a2402b2ec831cdefdc028f38502dc84e8d8
                                                                                          • Opcode Fuzzy Hash: 6b587ac2bf0a18ae1e1da40103b6ce1b1f6671fc227593c1177dfa3dba33bc05
                                                                                          • Instruction Fuzzy Hash: 78218BB19043458FCB50DFA9D50979EBFF4EB44318F24886ED459B7A41DB38A848CFA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 197 1934cc8-1934d0a 200 1934d10 197->200 201 1934d0c-1934d0e 197->201 202 1934d15-1934d20 200->202 201->202 203 1934d22-1934d53 RtlEncodePointer 202->203 204 1934d81-1934d8e 202->204 206 1934d55-1934d5b 203->206 207 1934d5c-1934d7c 203->207 206->207 207->204
                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 01934D42
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.646271813.0000000001930000.00000040.00000800.00020000.00000000.sdmp, Offset: 01930000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_1930000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: [kn
                                                                                          • API String ID: 2118026453-2182507298
                                                                                          • Opcode ID: 8e818f029b14bc806985a99e5382e09e751e8d8f7992274ca788d6b22ee31c83
                                                                                          • Instruction ID: 3e3ada44c4055695241e8fa3d457ffc4ebd6ebe8b15b9d3019e2e0b3fd1fe359
                                                                                          • Opcode Fuzzy Hash: 8e818f029b14bc806985a99e5382e09e751e8d8f7992274ca788d6b22ee31c83
                                                                                          • Instruction Fuzzy Hash: CB117C719003458FDB50DFAAD5497DEBFF8EB44318F208829E419B7A40DB78A948CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 209 6467622-6467d74 KiUserExceptionDispatcher * 2 287 6467d7a-6467dbf 209->287
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 65c4993487a3ac1ed4a0c8fb43143ff2ef5554e67398eb3ad7c1d522575f1de6
                                                                                          • Instruction ID: 8fd0ca79589ab255d4e159eac49c626f7ccf2f56d06169086891b00558302317
                                                                                          • Opcode Fuzzy Hash: 65c4993487a3ac1ed4a0c8fb43143ff2ef5554e67398eb3ad7c1d522575f1de6
                                                                                          • Instruction Fuzzy Hash: 2EA1EA38906358CFCBA5EF70D8886A9B7B2FF5570AF1041DAD50A52350DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 290 6467669-6467d74 KiUserExceptionDispatcher * 2 365 6467d7a-6467dbf 290->365
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 8b52f9274f4013a762fb916bfbec184b92fd51a3e2a9f10b14d4c35a2775e14d
                                                                                          • Instruction ID: d475281d606b9cf7b07a918d4e139b490fe36ba5460795ec6792cc1b339e28d8
                                                                                          • Opcode Fuzzy Hash: 8b52f9274f4013a762fb916bfbec184b92fd51a3e2a9f10b14d4c35a2775e14d
                                                                                          • Instruction Fuzzy Hash: 7DA1FA38906358CFCBA5EF70D8886A9B7B2FF5970AF1041DAD50A52350DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 368 64676b0-6467d74 KiUserExceptionDispatcher * 2 440 6467d7a-6467dbf 368->440
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: e56dd234926c69f5a868dfe51f98a829b044f5cdedecd7e6a9e32532d14db453
                                                                                          • Instruction ID: 4238b4cd01d4fea97dcdf9a3cb78138d7ea062b7273395fc3711b67d07d03da6
                                                                                          • Opcode Fuzzy Hash: e56dd234926c69f5a868dfe51f98a829b044f5cdedecd7e6a9e32532d14db453
                                                                                          • Instruction Fuzzy Hash: FEA1FA38906358CFDBA5EF70D8886A9B7B2FF5570AF1041DAD50A92340DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 443 64676f7-6467d74 KiUserExceptionDispatcher * 2 512 6467d7a-6467dbf 443->512
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: c8f9765107d7634b2e7702d5c6d6008734b22bd2b62c42881153cafe425249b6
                                                                                          • Instruction ID: 73a2bf8f2a972fbe1d72cb602e25918ec5b55b9c1b4a4697a7f81da8e27cbd27
                                                                                          • Opcode Fuzzy Hash: c8f9765107d7634b2e7702d5c6d6008734b22bd2b62c42881153cafe425249b6
                                                                                          • Instruction Fuzzy Hash: 9F911B38901398CFCBA5EF70D8886A9B7B2FF5570AF1041DAD50A52340DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 515 6467735-6467d74 KiUserExceptionDispatcher * 2 581 6467d7a-6467dbf 515->581
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 48a98ba1dde8e1ead3eaad2af919caea1cddee560d3533f604b5b8a3d497b5e4
                                                                                          • Instruction ID: 80de3653784ca9f5e5eb00cf67165a225a13983a76c6c12449a8ba106e6fa9b1
                                                                                          • Opcode Fuzzy Hash: 48a98ba1dde8e1ead3eaad2af919caea1cddee560d3533f604b5b8a3d497b5e4
                                                                                          • Instruction Fuzzy Hash: 7A91FA38906358CFCBA5EF70D8886A9B7B2FF5570AF1041DAD50A92350DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 584 646777c-6467d74 KiUserExceptionDispatcher * 2 647 6467d7a-6467dbf 584->647
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 2abdece46bbd0c59cf37f5a34a5a257c282be8505fb9f51dbd69ca12140b0fbc
                                                                                          • Instruction ID: 47c8f9c531a2934951a3e1b58b2826ca51fd3f510f41b97b58f67127276530cd
                                                                                          • Opcode Fuzzy Hash: 2abdece46bbd0c59cf37f5a34a5a257c282be8505fb9f51dbd69ca12140b0fbc
                                                                                          • Instruction Fuzzy Hash: 5A81FA38905358CFCBA5EF70D8886A9B7B2FF59709F1041DAD50A92350DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 650 64677c3-6467d74 KiUserExceptionDispatcher * 2 710 6467d7a-6467dbf 650->710
                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467836
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 06467A52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.648575153.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6460000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: da4e44f689a6cd206193877221902809af6be1c4fe2764cd3374af36ef7c7aea
                                                                                          • Instruction ID: fd0711558eb7af5773d0dc9868fcbe4dd093d8637d379868dffdaf71fc585419
                                                                                          • Opcode Fuzzy Hash: da4e44f689a6cd206193877221902809af6be1c4fe2764cd3374af36ef7c7aea
                                                                                          • Instruction Fuzzy Hash: 9481FA38906358CFDBA5EF70D8886A9B7B2FF55709F1041DAD50A92340DB359E82CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.645326162.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_168d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2160fdb91d77ef264e0f0ce59d0a591521a7a5f32637e988d3f0d6087278dbd6
                                                                                          • Instruction ID: 5b192f1acfebd1a37317c9571bade95c87fc4ad0b16959ab1bb852cc8e0b46dd
                                                                                          • Opcode Fuzzy Hash: 2160fdb91d77ef264e0f0ce59d0a591521a7a5f32637e988d3f0d6087278dbd6
                                                                                          • Instruction Fuzzy Hash: 70318E7550D3C08FDB03DB24C9A4755BF71AF43214F1986DBC8898B2A7D33A984ACB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.645326162.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_168d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 66c7556a7629d3061bc5d3e60632a6f0ccd56d018ee24155dc6fbb4bed009fc0
                                                                                          • Instruction ID: 064967139b9961595a5f195bb8e2468ecc8f8e158766d92e7d2838c9a029fe0b
                                                                                          • Opcode Fuzzy Hash: 66c7556a7629d3061bc5d3e60632a6f0ccd56d018ee24155dc6fbb4bed009fc0
                                                                                          • Instruction Fuzzy Hash: 6E21F571605244EFDB15EF18DDC0B26BBA5FB84324F24CA69D94D4B346C337D846CAA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.645326162.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_168d000_DHL - OVERDUE ACCOUNT - 130115482244.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0f53fce40682445c5be5636b6a5e07fa588b9308402cb05fd7ef6edfdb44f1e9
                                                                                          • Instruction ID: e0df89e10f0d5a2e9a2e0d675975ef79597d4062502438ca15382ab26804982e
                                                                                          • Opcode Fuzzy Hash: 0f53fce40682445c5be5636b6a5e07fa588b9308402cb05fd7ef6edfdb44f1e9
                                                                                          • Instruction Fuzzy Hash: 2F21A3755093C09FDB13DB24C990715BF71AF46214F18C6DBD8498B6A7C33A980ACB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%