Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL Factura Electronica Pendiente documento No 04BB25083.exe

Overview

General Information

Sample name:DHL Factura Electronica Pendiente documento No 04BB25083.exe
Analysis ID:1396156
MD5:57c1720399fe09ae9cb92000d830260a
SHA1:5a9eccab9ebf649c94051ab9d2eaea47621ff3d6
SHA256:d9e11bf6dbbb2e9e75574f370b57e32efd4be3b1ba193b934933515aed9b933e
Tags:DHLexeFormbook
Infos:

Detection

FormBook, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect virtualization through RDTSC time measurements
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • DHL Factura Electronica Pendiente documento No 04BB25083.exe (PID: 7472 cmdline: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe MD5: 57C1720399FE09AE9CB92000D830260A)
    • powershell.exe (PID: 7740 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • DHL Factura Electronica Pendiente documento No 04BB25083.exe (PID: 7760 cmdline: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe MD5: 57C1720399FE09AE9CB92000D830260A)
      • explorer.exe (PID: 4084 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • systray.exe (PID: 7928 cmdline: C:\Windows\SysWOW64\systray.exe MD5: 28D565BB24D30E5E3DE8AFF6900AF098)
          • cmd.exe (PID: 7952 cmdline: /c del "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.rdlva.com/pz08/"], "decoy": ["deespresence.com", "fanyablack.com", "papermoonnursery.com", "sunriseclohting.store", "jenstandsforarkansas.com", "lkhtalentconsulting.com", "baerana.com", "hyperphit.com", "davidianbrant.com", "itkagear.com", "web-findmy.site", "liveforwardventures.com", "skyenglearn.online", "studio-sticky.store", "yassa-hany.online", "tacoshack479.com", "bigtexture.xyz", "erxkula.shop", "go-bloggers.com", "qwdlwys.site", "taylorpritchett.com", "yobo-by.com", "trendsdrop.com", "boostyourselftoday.com", "taxibactrungnam.com", "sgzycp.net", "anti-theft-device-82641.bond", "ytytyt016.xyz", "loveyourhome.style", "ithinkmoney.com", "bertric.info", "permanentday.space", "kxn.ink", "onlythumbs.online", "techrihno.com", "washing-machine-46612.bond", "phdop.xyz", "nordens-media.com", "gourmetfoodfactory.com", "ketoalycetiworks.buzz", "amplilim.site", "usetruerreview.com", "inprime.xyz", "aloyoga-uae.com", "quickfibrokers.com", "primadesignerhomes.com", "greatlifehacks.online", "thewipglobal.com", "tobegoodlife.net", "hotelfincamalvasia.com", "trevts.com", "ae-skinlab.com", "grammarhome.com", "cld005.com", "first-solution.online", "keylabcerrajeria.com", "besttravelsgate.com", "friskiwear.com", "hedrickmanufactory.com", "pinewell.world", "5819995.com", "c2help.live", "kai3.center", "plantasdasminas.com"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1469792389.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
        • 0x1cbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
        00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        Click to see the 30 entries
        SourceRuleDescriptionAuthorStrings
        0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
              • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
              • 0x1bdb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
              • 0x9bbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
              • 0x14aa7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
              5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
              • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
              • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
              • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
              • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
              • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
              • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
              • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
              • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
              • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
              • 0x1ab17:$sequence_8: 3C 54 74 04 3C 74 75 F4
              • 0x1bb1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
              Click to see the 17 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentImage: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentProcessId: 7472, ParentProcessName: DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessId: 7740, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentImage: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentProcessId: 7472, ParentProcessName: DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessId: 7740, ProcessName: powershell.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentImage: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ParentProcessId: 7472, ParentProcessName: DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe, ProcessId: 7740, ProcessName: powershell.exe
              Timestamp:02/21/24-14:37:39.569984
              SID:2031412
              Source Port:49722
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:02/21/24-14:38:01.164210
              SID:2031412
              Source Port:49723
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:02/21/24-14:34:54.459744
              SID:2031412
              Source Port:49714
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:02/21/24-14:37:19.115942
              SID:2031412
              Source Port:49721
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:02/21/24-14:35:55.287926
              SID:2031412
              Source Port:49720
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:02/21/24-14:35:13.479776
              SID:2031412
              Source Port:49716
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeAvira: detected
              Source: http://www.permanentday.spaceAvira URL Cloud: Label: malware
              Source: http://www.aloyoga-uae.com/pz08/Avira URL Cloud: Label: phishing
              Source: http://www.phdop.xyz/pz08/www.quickfibrokers.comAvira URL Cloud: Label: phishing
              Source: http://www.ae-skinlab.com/pz08/Avira URL Cloud: Label: malware
              Source: http://www.itkagear.com/pz08/www.jenstandsforarkansas.comAvira URL Cloud: Label: malware
              Source: http://www.itkagear.com/pz08/Avira URL Cloud: Label: malware
              Source: http://www.quickfibrokers.com/pz08/Avira URL Cloud: Label: malware
              Source: http://www.bigtexture.xyz/pz08/www.baerana.comAvira URL Cloud: Label: phishing
              Source: http://www.quickfibrokers.com/pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42Avira URL Cloud: Label: malware
              Source: http://www.bigtexture.xyz/pz08/Avira URL Cloud: Label: phishing
              Source: http://www.c2help.live/pz08/Avira URL Cloud: Label: malware
              Source: http://www.permanentday.space/pz08/www.usetruerreview.comAvira URL Cloud: Label: malware
              Source: http://www.quickfibrokers.comAvira URL Cloud: Label: malware
              Source: http://www.quickfibrokers.com/pz08/www.permanentday.spaceAvira URL Cloud: Label: malware
              Source: http://www.permanentday.space/pz08/Avira URL Cloud: Label: malware
              Source: http://www.ae-skinlab.com/pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42Avira URL Cloud: Label: malware
              Source: http://www.c2help.live/pz08/www.papermoonnursery.comAvira URL Cloud: Label: malware
              Source: http://www.c2help.liveAvira URL Cloud: Label: malware
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.rdlva.com/pz08/"], "decoy": ["deespresence.com", "fanyablack.com", "papermoonnursery.com", "sunriseclohting.store", "jenstandsforarkansas.com", "lkhtalentconsulting.com", "baerana.com", "hyperphit.com", "davidianbrant.com", "itkagear.com", "web-findmy.site", "liveforwardventures.com", "skyenglearn.online", "studio-sticky.store", "yassa-hany.online", "tacoshack479.com", "bigtexture.xyz", "erxkula.shop", "go-bloggers.com", "qwdlwys.site", "taylorpritchett.com", "yobo-by.com", "trendsdrop.com", "boostyourselftoday.com", "taxibactrungnam.com", "sgzycp.net", "anti-theft-device-82641.bond", "ytytyt016.xyz", "loveyourhome.style", "ithinkmoney.com", "bertric.info", "permanentday.space", "kxn.ink", "onlythumbs.online", "techrihno.com", "washing-machine-46612.bond", "phdop.xyz", "nordens-media.com", "gourmetfoodfactory.com", "ketoalycetiworks.buzz", "amplilim.site", "usetruerreview.com", "inprime.xyz", "aloyoga-uae.com", "quickfibrokers.com", "primadesignerhomes.com", "greatlifehacks.online", "thewipglobal.com", "tobegoodlife.net", "hotelfincamalvasia.com", "trevts.com", "ae-skinlab.com", "grammarhome.com", "cld005.com", "first-solution.online", "keylabcerrajeria.com", "besttravelsgate.com", "friskiwear.com", "hedrickmanufactory.com", "pinewell.world", "5819995.com", "c2help.live", "kai3.center", "plantasdasminas.com"]}
              Source: quickfibrokers.comVirustotal: Detection: 5%Perma Link
              Source: http://www.aloyoga-uae.com/pz08/Virustotal: Detection: 10%Perma Link
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeReversingLabs: Detection: 34%
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeVirustotal: Detection: 40%Perma Link
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeJoe Sandbox ML: detected
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: systray.pdb source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532295892.00000000013E8000.00000004.00000020.00020000.00000000.sdmp, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532450254.0000000001810000.00000040.10000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3884035219.00000000000B0000.00000040.80000000.00040000.00000000.sdmp
              Source: Binary string: systray.pdbGCTL source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532295892.00000000013E8000.00000004.00000020.00020000.00000000.sdmp, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532450254.0000000001810000.00000040.10000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3884035219.00000000000B0000.00000040.80000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1532523813.000000000492E000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1534349784.0000000004AD2000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, systray.exe, systray.exe, 00000007.00000003.1532523813.000000000492E000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1534349784.0000000004AD2000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 4x nop then pop esi5_2_00417312
              Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop esi7_2_02D17312

              Networking

              barindex
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49714 -> 3.33.130.190:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49716 -> 34.149.87.45:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49720 -> 15.197.142.173:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49721 -> 91.195.240.117:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49722 -> 103.224.212.213:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.8:49723 -> 103.167.199.20:80
              Source: Malware configuration extractorURLs: www.rdlva.com/pz08/
              Source: DNS query: www.bigtexture.xyz
              Source: global trafficHTTP traffic detected: GET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+ HTTP/1.1Host: www.rdlva.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.ae-skinlab.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.quickfibrokers.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=iUtqEraofiOoamAGmz9y1BZqdP67NXRhW/u/s4hsis3XwB7pF+A9OlO8MXjIW5A/mozx&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.baerana.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiR HTTP/1.1Host: www.yassa-hany.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=bKUMdxsXbZ20XGxWaFGGS8S5qdUvksLLWvMweKpTgT2MARQxqrmnXGgSr/TayxAxMgg2&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.taxibactrungnam.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: Joe Sandbox ViewIP Address: 91.195.240.117 91.195.240.117
              Source: Joe Sandbox ViewIP Address: 103.224.212.213 103.224.212.213
              Source: Joe Sandbox ViewIP Address: 15.197.142.173 15.197.142.173
              Source: Joe Sandbox ViewASN Name: SEDO-ASDE SEDO-ASDE
              Source: Joe Sandbox ViewASN Name: TRELLIAN-AS-APTrellianPtyLimitedAU TRELLIAN-AS-APTrellianPtyLimitedAU
              Source: Joe Sandbox ViewASN Name: TANDEMUS TANDEMUS
              Source: Joe Sandbox ViewASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Windows\explorer.exeCode function: 6_2_0E071F82 getaddrinfo,setsockopt,recv,6_2_0E071F82
              Source: global trafficHTTP traffic detected: GET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+ HTTP/1.1Host: www.rdlva.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.ae-skinlab.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.quickfibrokers.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=iUtqEraofiOoamAGmz9y1BZqdP67NXRhW/u/s4hsis3XwB7pF+A9OlO8MXjIW5A/mozx&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.baerana.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiR HTTP/1.1Host: www.yassa-hany.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /pz08/?Ap=bKUMdxsXbZ20XGxWaFGGS8S5qdUvksLLWvMweKpTgT2MARQxqrmnXGgSr/TayxAxMgg2&N6Ahw=3ffl2F0Punah42 HTTP/1.1Host: www.taxibactrungnam.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: unknownDNS traffic detected: queries for: www.rdlva.com
              Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: awselb/2.0Date: Wed, 21 Feb 2024 13:35:55 GMTContent-Type: text/htmlContent-Length: 118Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 21 Feb 2024 13:38:01 GMTContent-Type: text/html; charset=utf-8Content-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.000000000921D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009220000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.000000000921D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009220000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.000000000921D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009220000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: explorer.exe, 00000006.00000002.3901744709.0000000010E5F000.00000004.80000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3885851208.00000000056BF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://img.sedoparking.com
              Source: explorer.exe, 00000006.00000000.1476006897.0000000004405000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3886674045.0000000004405000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ns.adobeS
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.000000000921D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009220000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: explorer.exe, 00000006.00000002.3890474944.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000090DA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
              Source: explorer.exe, 00000006.00000002.3889073866.0000000007720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1473566211.0000000002C80000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1479452391.0000000007710000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1467009069.0000000002A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ae-skinlab.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ae-skinlab.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ae-skinlab.com/pz08/www.phdop.xyz
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ae-skinlab.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aloyoga-uae.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aloyoga-uae.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aloyoga-uae.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.anti-theft-device-82641.bond
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.anti-theft-device-82641.bond/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.anti-theft-device-82641.bond/pz08/www.itkagear.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.anti-theft-device-82641.bondReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.baerana.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.baerana.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.baerana.com/pz08/www.yassa-hany.online
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.baerana.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigtexture.xyz
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigtexture.xyz/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigtexture.xyz/pz08/www.baerana.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bigtexture.xyzReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.c2help.live
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.c2help.live/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.c2help.live/pz08/www.papermoonnursery.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.c2help.liveReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.itkagear.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.itkagear.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.itkagear.com/pz08/www.jenstandsforarkansas.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.itkagear.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jenstandsforarkansas.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jenstandsforarkansas.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jenstandsforarkansas.com/pz08/www.aloyoga-uae.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jenstandsforarkansas.comReferer:
              Source: explorer.exe, 00000006.00000003.2284484234.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.0000000009237000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.papermoonnursery.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.papermoonnursery.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.papermoonnursery.com/pz08/www.anti-theft-device-82641.bond
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.papermoonnursery.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.permanentday.space
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.permanentday.space/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.permanentday.space/pz08/www.usetruerreview.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.permanentday.spaceReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.phdop.xyz
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.phdop.xyz/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.phdop.xyz/pz08/www.quickfibrokers.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.phdop.xyzReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickfibrokers.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickfibrokers.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickfibrokers.com/pz08/www.permanentday.space
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickfibrokers.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rdlva.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rdlva.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rdlva.com/pz08/www.ae-skinlab.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rdlva.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxibactrungnam.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxibactrungnam.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxibactrungnam.com/pz08/www.c2help.live
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxibactrungnam.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.usetruerreview.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.usetruerreview.com/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.usetruerreview.com/pz08/www.bigtexture.xyz
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.usetruerreview.comReferer:
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yassa-hany.online
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yassa-hany.online/pz08/
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yassa-hany.online/pz08/www.taxibactrungnam.com
              Source: explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yassa-hany.onlineReferer:
              Source: explorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
              Source: explorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
              Source: explorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSA4
              Source: explorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSd
              Source: explorer.exe, 00000006.00000003.3077066240.0000000007042000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1477551956.000000000702D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077452667.000000000704B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2808789548.000000000703F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3888210389.000000000704E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.000000000702D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
              Source: explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: explorer.exe, 00000006.00000002.3890474944.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000090DA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0E948A694F8C48079B908C8EA9DDF9EA&timeOut=5000&oc
              Source: explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3890474944.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
              Source: explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3890474944.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
              Source: explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
              Source: explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-dark
              Source: explorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1b2aMG.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hGNsX.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAT0qC2.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYTL1i.img
              Source: explorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
              Source: explorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comer
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
              Source: explorer.exe, 00000006.00000003.2285909149.000000000BDF5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2809145354.000000000BDF5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BDF5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/EM0
              Source: explorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com48
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/predicting-what-the-pac-12-would-look-like-after-expansion-wi
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
              Source: explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
              Source: explorer.exe, 00000006.00000002.3901744709.0000000010E5F000.00000004.80000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3885851208.00000000056BF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3
              Source: systray.exe, 00000007.00000002.3885851208.00000000056BF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.tucowsdomains.com/

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000006.00000002.3899090558.000000000E089000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: Process Memory Space: DHL Factura Electronica Pendiente documento No 04BB25083.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: Process Memory Space: DHL Factura Electronica Pendiente documento No 04BB25083.exe PID: 7760, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: Process Memory Space: systray.exe PID: 7928, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: initial sampleStatic PE information: Filename: DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A350 NtCreateFile,5_2_0041A350
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A400 NtReadFile,5_2_0041A400
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A480 NtClose,5_2_0041A480
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A530 NtAllocateVirtualMemory,5_2_0041A530
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A47C NtClose,5_2_0041A47C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041A52A NtAllocateVirtualMemory,5_2_0041A52A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_01982BF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982B60 NtClose,LdrInitializeThunk,5_2_01982B60
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982AD0 NtReadFile,LdrInitializeThunk,5_2_01982AD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982DD0 NtDelayExecution,LdrInitializeThunk,5_2_01982DD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_01982DF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982D10 NtMapViewOfSection,LdrInitializeThunk,5_2_01982D10
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_01982D30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_01982CA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_01982C70
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982F90 NtProtectVirtualMemory,LdrInitializeThunk,5_2_01982F90
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982FB0 NtResumeThread,LdrInitializeThunk,5_2_01982FB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982FE0 NtCreateFile,LdrInitializeThunk,5_2_01982FE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982F30 NtCreateSection,LdrInitializeThunk,5_2_01982F30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_01982E80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,5_2_01982EA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01984340 NtSetContextThread,5_2_01984340
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01984650 NtSuspendThread,5_2_01984650
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982B80 NtQueryInformationFile,5_2_01982B80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982BA0 NtEnumerateValueKey,5_2_01982BA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982BE0 NtQueryValueKey,5_2_01982BE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982AB0 NtWaitForSingleObject,5_2_01982AB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982AF0 NtWriteFile,5_2_01982AF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982DB0 NtEnumerateKey,5_2_01982DB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982D00 NtSetInformationFile,5_2_01982D00
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982CC0 NtQueryVirtualMemory,5_2_01982CC0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982CF0 NtOpenProcess,5_2_01982CF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982C00 NtQueryInformationProcess,5_2_01982C00
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982C60 NtCreateKey,5_2_01982C60
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982FA0 NtQuerySection,5_2_01982FA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982F60 NtCreateProcessEx,5_2_01982F60
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982EE0 NtQueueApcThread,5_2_01982EE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982E30 NtWriteVirtualMemory,5_2_01982E30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01983090 NtSetValueKey,5_2_01983090
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01983010 NtOpenDirectoryObject,5_2_01983010
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019835C0 NtCreateMutant,5_2_019835C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019839B0 NtGetContextThread,5_2_019839B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01983D10 NtOpenProcessToken,5_2_01983D10
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01983D70 NtOpenThread,5_2_01983D70
              Source: C:\Windows\explorer.exeCode function: 6_2_0E072E12 NtProtectVirtualMemory,6_2_0E072E12
              Source: C:\Windows\explorer.exeCode function: 6_2_0E071232 NtCreateFile,6_2_0E071232
              Source: C:\Windows\explorer.exeCode function: 6_2_0E072E0A NtProtectVirtualMemory,6_2_0E072E0A
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2CA0 NtQueryInformationToken,LdrInitializeThunk,7_2_04CF2CA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2C60 NtCreateKey,LdrInitializeThunk,7_2_04CF2C60
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_04CF2C70
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2DD0 NtDelayExecution,LdrInitializeThunk,7_2_04CF2DD0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_04CF2DF0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2D10 NtMapViewOfSection,LdrInitializeThunk,7_2_04CF2D10
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,7_2_04CF2EA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2FE0 NtCreateFile,LdrInitializeThunk,7_2_04CF2FE0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2F30 NtCreateSection,LdrInitializeThunk,7_2_04CF2F30
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2AD0 NtReadFile,LdrInitializeThunk,7_2_04CF2AD0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2BE0 NtQueryValueKey,LdrInitializeThunk,7_2_04CF2BE0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,7_2_04CF2BF0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2B60 NtClose,LdrInitializeThunk,7_2_04CF2B60
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF35C0 NtCreateMutant,LdrInitializeThunk,7_2_04CF35C0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF4650 NtSuspendThread,7_2_04CF4650
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF4340 NtSetContextThread,7_2_04CF4340
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2CC0 NtQueryVirtualMemory,7_2_04CF2CC0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2CF0 NtOpenProcess,7_2_04CF2CF0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2C00 NtQueryInformationProcess,7_2_04CF2C00
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2DB0 NtEnumerateKey,7_2_04CF2DB0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2D00 NtSetInformationFile,7_2_04CF2D00
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2D30 NtUnmapViewOfSection,7_2_04CF2D30
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2EE0 NtQueueApcThread,7_2_04CF2EE0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2E80 NtReadVirtualMemory,7_2_04CF2E80
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2E30 NtWriteVirtualMemory,7_2_04CF2E30
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2F90 NtProtectVirtualMemory,7_2_04CF2F90
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2FA0 NtQuerySection,7_2_04CF2FA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2FB0 NtResumeThread,7_2_04CF2FB0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2F60 NtCreateProcessEx,7_2_04CF2F60
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2AF0 NtWriteFile,7_2_04CF2AF0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2AB0 NtWaitForSingleObject,7_2_04CF2AB0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2B80 NtQueryInformationFile,7_2_04CF2B80
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF2BA0 NtEnumerateValueKey,7_2_04CF2BA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF3090 NtSetValueKey,7_2_04CF3090
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF3010 NtOpenDirectoryObject,7_2_04CF3010
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF3D70 NtOpenThread,7_2_04CF3D70
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF3D10 NtOpenProcessToken,7_2_04CF3D10
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF39B0 NtGetContextThread,7_2_04CF39B0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A350 NtCreateFile,7_2_02D1A350
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A480 NtClose,7_2_02D1A480
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A400 NtReadFile,7_2_02D1A400
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A530 NtAllocateVirtualMemory,7_2_02D1A530
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A47C NtClose,7_2_02D1A47C
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1A52A NtAllocateVirtualMemory,7_2_02D1A52A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_00C2DE9C0_2_00C2DE9C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C5C5A00_2_06C5C5A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C57D300_2_06C57D30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C5B5C00_2_06C5B5C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C500400_2_06C50040
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C500060_2_06C50006
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_07000B300_2_07000B30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_070058180_2_07005818
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_070014E00_2_070014E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C580180_2_06C58018
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041E84B5_2_0041E84B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_004010305_2_00401030
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D9B65_2_0041D9B6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041EB6E5_2_0041EB6E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041DCA15_2_0041DCA1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00402D875_2_00402D87
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00402D905_2_00402D90
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00409E4C5_2_00409E4C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00409E505_2_00409E50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D7705_2_0041D770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00402FB05_2_00402FB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A101AA5_2_01A101AA
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A081CC5_2_01A081CC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EA1185_2_019EA118
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019401005_2_01940100
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D81585_2_019D8158
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E20005_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A103E65_2_01A103E6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E3F05_2_0195E3F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0A3525_2_01A0A352
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D02C05_2_019D02C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F02745_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A105915_2_01A10591
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019505355_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FE4F65_2_019FE4F6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F44205_2_019F4420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A024465_2_01A02446
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194C7C05_2_0194C7C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019747505_2_01974750
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019507705_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196C6E05_2_0196C6E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A1A9A65_2_01A1A9A6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A05_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019669625_2_01966962
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019368B85_2_019368B8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E8F05_2_0197E8F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019528405_2_01952840
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195A8405_2_0195A840
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A06BD75_2_01A06BD7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0AB405_2_01A0AB40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA805_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01968DBF5_2_01968DBF
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194ADE05_2_0194ADE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019ECD1F5_2_019ECD1F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195AD005_2_0195AD00
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0CB55_2_019F0CB5
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940CF25_2_01940CF2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950C005_2_01950C00
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CEFA05_2_019CEFA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01942FC85_2_01942FC8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195CFE05_2_0195CFE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01970F305_2_01970F30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F2F305_2_019F2F30
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01992F285_2_01992F28
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C4F405_2_019C4F40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962E905_2_01962E90
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0CE935_2_01A0CE93
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0EEDB5_2_01A0EEDB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0EE265_2_01A0EE26
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950E595_2_01950E59
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195B1B05_2_0195B1B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A1B16B5_2_01A1B16B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193F1725_2_0193F172
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0198516C5_2_0198516C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0F0E05_2_01A0F0E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A070E95_2_01A070E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FF0CC5_2_019FF0CC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019570C05_2_019570C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0199739A5_2_0199739A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0132D5_2_01A0132D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193D34C5_2_0193D34C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019552A05_2_019552A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196B2C05_2_0196B2C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F12ED5_2_019F12ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019ED5B05_2_019ED5B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A075715_2_01A07571
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0F43F5_2_01A0F43F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019414605_2_01941460
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0F7B05_2_01A0F7B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A016CC5_2_01A016CC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E59105_2_019E5910
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019599505_2_01959950
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196B9505_2_0196B950
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019538E05_2_019538E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BD8005_2_019BD800
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196FB805_2_0196FB80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0198DBF95_2_0198DBF9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C5BF05_2_019C5BF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0FB765_2_01A0FB76
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EDAAC5_2_019EDAAC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01995AA05_2_01995AA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F1AA35_2_019F1AA3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FDAC65_2_019FDAC6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A07A465_2_01A07A46
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0FA495_2_01A0FA49
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C3A6C5_2_019C3A6C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196FDC05_2_0196FDC0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A07D735_2_01A07D73
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01953D405_2_01953D40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A01D5A5_2_01A01D5A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0FCF25_2_01A0FCF2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C9C325_2_019C9C32
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01951F925_2_01951F92
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0FFB15_2_01A0FFB1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0FF095_2_01A0FF09
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01959EB05_2_01959EB0
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCEB5CD6_2_0DCEB5CD
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCDFD026_2_0DCDFD02
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCE59126_2_0DCE5912
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCDE0826_2_0DCDE082
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCE70366_2_0DCE7036
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCE2B326_2_0DCE2B32
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCE2B306_2_0DCE2B30
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCE82326_2_0DCE8232
              Source: C:\Windows\explorer.exeCode function: 6_2_0E0712326_2_0E071232
              Source: C:\Windows\explorer.exeCode function: 6_2_0E0700366_2_0E070036
              Source: C:\Windows\explorer.exeCode function: 6_2_0E0670826_2_0E067082
              Source: C:\Windows\explorer.exeCode function: 6_2_0E068D026_2_0E068D02
              Source: C:\Windows\explorer.exeCode function: 6_2_0E06E9126_2_0E06E912
              Source: C:\Windows\explorer.exeCode function: 6_2_0E06BB326_2_0E06BB32
              Source: C:\Windows\explorer.exeCode function: 6_2_0E06BB306_2_0E06BB30
              Source: C:\Windows\explorer.exeCode function: 6_2_0E0745CD6_2_0E0745CD
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D6E4F67_2_04D6E4F6
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D724467_2_04D72446
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D644207_2_04D64420
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D805917_2_04D80591
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC05357_2_04CC0535
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CDC6E07_2_04CDC6E0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CBC7C07_2_04CBC7C0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CE47507_2_04CE4750
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC07707_2_04CC0770
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D520007_2_04D52000
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D781CC7_2_04D781CC
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D801AA7_2_04D801AA
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D481587_2_04D48158
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CB01007_2_04CB0100
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D5A1187_2_04D5A118
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D402C07_2_04D402C0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D602747_2_04D60274
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CCE3F07_2_04CCE3F0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D803E67_2_04D803E6
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7A3527_2_04D7A352
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CB0CF27_2_04CB0CF2
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D60CB57_2_04D60CB5
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC0C007_2_04CC0C00
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CBADE07_2_04CBADE0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CD8DBF7_2_04CD8DBF
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D5CD1F7_2_04D5CD1F
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CCAD007_2_04CCAD00
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7EEDB7_2_04D7EEDB
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7CE937_2_04D7CE93
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CD2E907_2_04CD2E90
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC0E597_2_04CC0E59
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7EE267_2_04D7EE26
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CB2FC87_2_04CB2FC8
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CCCFE07_2_04CCCFE0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D3EFA07_2_04D3EFA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D34F407_2_04D34F40
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D62F307_2_04D62F30
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D02F287_2_04D02F28
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CE0F307_2_04CE0F30
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CEE8F07_2_04CEE8F0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CA68B87_2_04CA68B8
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CCA8407_2_04CCA840
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC28407_2_04CC2840
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC29A07_2_04CC29A0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D8A9A67_2_04D8A9A6
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CD69627_2_04CD6962
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CBEA807_2_04CBEA80
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D76BD77_2_04D76BD7
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7AB407_2_04D7AB40
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CB14607_2_04CB1460
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7F43F7_2_04D7F43F
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D5D5B07_2_04D5D5B0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D775717_2_04D77571
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D716CC7_2_04D716CC
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7F7B07_2_04D7F7B0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC70C07_2_04CC70C0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D6F0CC7_2_04D6F0CC
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7F0E07_2_04D7F0E0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D770E97_2_04D770E9
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CCB1B07_2_04CCB1B0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CF516C7_2_04CF516C
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D8B16B7_2_04D8B16B
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CAF1727_2_04CAF172
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CDB2C07_2_04CDB2C0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D612ED7_2_04D612ED
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC52A07_2_04CC52A0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D0739A7_2_04D0739A
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CAD34C7_2_04CAD34C
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7132D7_2_04D7132D
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7FCF27_2_04D7FCF2
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D39C327_2_04D39C32
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CDFDC07_2_04CDFDC0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC3D407_2_04CC3D40
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D71D5A7_2_04D71D5A
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D77D737_2_04D77D73
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC9EB07_2_04CC9EB0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC1F927_2_04CC1F92
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7FFB17_2_04D7FFB1
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7FF097_2_04D7FF09
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC38E07_2_04CC38E0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D2D8007_2_04D2D800
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CC99507_2_04CC9950
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CDB9507_2_04CDB950
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D559107_2_04D55910
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D6DAC67_2_04D6DAC6
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D05AA07_2_04D05AA0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D61AA37_2_04D61AA3
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D5DAAC7_2_04D5DAAC
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D77A467_2_04D77A46
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7FA497_2_04D7FA49
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D33A6C7_2_04D33A6C
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D35BF07_2_04D35BF0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CFDBF97_2_04CFDBF9
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CDFB807_2_04CDFB80
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04D7FB767_2_04D7FB76
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1EB6E7_2_02D1EB6E
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1E84B7_2_02D1E84B
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D02FB07_2_02D02FB0
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D02D907_2_02D02D90
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D02D877_2_02D02D87
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D09E507_2_02D09E50
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D09E4C7_2_02D09E4C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: String function: 01985130 appears 58 times
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: String function: 019CF290 appears 105 times
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: String function: 01997E54 appears 102 times
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: String function: 0193B970 appears 280 times
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: String function: 019BEA12 appears 86 times
              Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04D3F290 appears 105 times
              Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04CF5130 appears 58 times
              Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04CAB970 appears 280 times
              Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04D07E54 appears 102 times
              Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04D2EA12 appears 86 times
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1465867346.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000000.1409330070.00000000005F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametuHT.exe8 vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1474227985.0000000006C98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1474534222.0000000006F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532555059.0000000001A3D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532295892.00000000013E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesystray.exej% vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532450254.0000000001813000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamesystray.exej% vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeBinary or memory string: OriginalFilenametuHT.exe8 vs DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeSection loaded: wininet.dllJump to behavior
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000006.00000002.3899090558.000000000E089000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: Process Memory Space: DHL Factura Electronica Pendiente documento No 04BB25083.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: Process Memory Space: DHL Factura Electronica Pendiente documento No 04BB25083.exe PID: 7760, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: Process Memory Space: systray.exe PID: 7928, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, I7B6ZmAJgXiulq8aXx.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, FQDATELQ9X9cFu3Qxc.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, FQDATELQ9X9cFu3Qxc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, FQDATELQ9X9cFu3Qxc.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, FQDATELQ9X9cFu3Qxc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
              Source: classification engineClassification label: mal100.troj.evad.winEXE@11/6@10/6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL Factura Electronica Pendiente documento No 04BB25083.exe.logJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipifyeev.13a.ps1Jump to behavior
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeReversingLabs: Detection: 34%
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeVirustotal: Detection: 40%
              Source: unknownProcess created: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\systray.exe C:\Windows\SysWOW64\systray.exe
              Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\systray.exe C:\Windows\SysWOW64\systray.exeJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe"Jump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: systray.pdb source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532295892.00000000013E8000.00000004.00000020.00020000.00000000.sdmp, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532450254.0000000001810000.00000040.10000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3884035219.00000000000B0000.00000040.80000000.00040000.00000000.sdmp
              Source: Binary string: systray.pdbGCTL source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532295892.00000000013E8000.00000004.00000020.00020000.00000000.sdmp, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532450254.0000000001810000.00000040.10000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3884035219.00000000000B0000.00000040.80000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1532523813.000000000492E000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1534349784.0000000004AD2000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, DHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, systray.exe, systray.exe, 00000007.00000003.1532523813.000000000492E000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, systray.exe, 00000007.00000003.1534349784.0000000004AD2000.00000004.00000020.00020000.00000000.sdmp, systray.exe, 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, wlMuNfYU9ETTr7SmU1.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, wlMuNfYU9ETTr7SmU1.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, wlMuNfYU9ETTr7SmU1.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exe, Form1.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, I7B6ZmAJgXiulq8aXx.cs.Net Code: lrL8I7rjiC System.Reflection.Assembly.Load(byte[])
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, Architectural.cs.Net Code: Justy
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, Architectural.cs.Net Code: BfZIR9eYv System.Reflection.Assembly.Load(byte[])
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, I7B6ZmAJgXiulq8aXx.cs.Net Code: lrL8I7rjiC System.Reflection.Assembly.Load(byte[])
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, Architectural.cs.Net Code: Justy
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, Architectural.cs.Net Code: BfZIR9eYv System.Reflection.Assembly.Load(byte[])
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, Architectural.cs.Net Code: Justy
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, Architectural.cs.Net Code: BfZIR9eYv System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 0_2_06C531B7 pushfd ; iretd 0_2_06C531BA
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041683E push esi; ret 5_2_0041683F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041718B push ds; iretd 5_2_0041718C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041E99E push esi; iretd 5_2_0041E99F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00417224 push ebx; iretd 5_2_0041722A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D4F2 push eax; ret 5_2_0041D4F8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D4FB push eax; ret 5_2_0041D562
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00417C92 push ss; retf 5_2_00417C9E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D4A5 push eax; ret 5_2_0041D4F8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0041D55C push eax; ret 5_2_0041D562
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0040F531 push 75DF417Dh; iretd 5_2_0040F536
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019409AD push ecx; mov dword ptr [esp], ecx5_2_019409B6
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCEB9B5 push esp; retn 0000h6_2_0DCEBAE7
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCEE08E push esi; iretd 6_2_0DCEE08F
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCEBB02 push esp; retn 0000h6_2_0DCEBB03
              Source: C:\Windows\explorer.exeCode function: 6_2_0DCEBB1E push esp; retn 0000h6_2_0DCEBB1F
              Source: C:\Windows\explorer.exeCode function: 6_2_0E07708E push esi; iretd 6_2_0E07708F
              Source: C:\Windows\explorer.exeCode function: 6_2_0E074B02 push esp; retn 0000h6_2_0E074B03
              Source: C:\Windows\explorer.exeCode function: 6_2_0E074B1E push esp; retn 0000h6_2_0E074B1F
              Source: C:\Windows\explorer.exeCode function: 6_2_0E0749B5 push esp; retn 0000h6_2_0E074AE7
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_04CB09AD push ecx; mov dword ptr [esp], ecx7_2_04CB09B6
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1683E push esi; ret 7_2_02D1683F
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1E99E push esi; iretd 7_2_02D1E99F
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D17224 push ebx; iretd 7_2_02D1722A
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1718B push ds; iretd 7_2_02D1718C
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1D4F2 push eax; ret 7_2_02D1D4F8
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1D4FB push eax; ret 7_2_02D1D562
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1D4A5 push eax; ret 7_2_02D1D4F8
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D1D55C push eax; ret 7_2_02D1D562
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D0F531 push 75DF417Dh; iretd 7_2_02D0F536
              Source: C:\Windows\SysWOW64\systray.exeCode function: 7_2_02D17C92 push ss; retf 7_2_02D17C9E
              Source: DHL Factura Electronica Pendiente documento No 04BB25083.exeStatic PE information: section name: .text entropy: 7.9217768147100704
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, emPKJuT6ymTAqlrrUB.csHigh entropy of concatenated method names: 'GVT1sN4obB', 'MZe1rw9b82', 'm211fk8bKi', 'sFt1pvDVQX', 'fW51hPD7it', 'RXb1QdtEtt', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, aHpbjAzSkkTSQPnS7P.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'p26wEmLnU8', 'EUxwBEtvQd', 'MGFwM8JZ3I', 'B98wP1plWa', 'afMw1LK2KE', 'BuEwwiUbN2', 'qtYw7KaeRf'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, si6svfR3UjjFCtAc7T.csHigh entropy of concatenated method names: 'jFtnZbjna4', 'J4LnCHQ9xb', 'Xjf0fcGjEO', 'aWP0psQ3uK', 'O5y0QG5IH1', 'R4o0tkOkhh', 'piA0jkfVbp', 'Yqe0JypUP8', 'ePU06Aj9GN', 'GnZ0N0naPF'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, lWqnYBNWXpWhpF6WYV.csHigh entropy of concatenated method names: 'DnOETAXyEP', 'kKqEeBJFDd', 'KyJEs4OqRx', 'OeTErkYpu8', 'TGBEpo1no3', 'g8DEQv14mf', 'B6REj6hGqc', 'SjREJekgPd', 'aJVENiyYWd', 'jRvEFXQ4yk'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, T4MeU36M6kDM53dRDO.csHigh entropy of concatenated method names: 'Esn0bKvPRP', 'a6y022rw9m', 'orW0TNePdP', 'SJU0eE83F0', 'Bf50BxetkY', 'Y8u0MGhyeY', 'ysv0PR6Ktc', 'J9N019IOEU', 'r780wxDehe', 'coS074KGeW'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, KtCP0PlpQVTFkiyZbtF.csHigh entropy of concatenated method names: 'EIewg9v6Pd', 'WvKwlPaxeR', 'SafwIsBUu3', 'Gv7wbb6GDF', 'cK3wZnFxsJ', 'x8pw2YZU3v', 'Cp9wCMmsOS', 'RvHwTDkc38', 'yWRwefFykm', 'aZgwk5JmgM'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, EjwV8fVXT718mwuv65.csHigh entropy of concatenated method names: 'BWH1CyDrIBjHAiqmLqD', 'M4C5onDBXPFV1vtuxkK', 'zVjD1mx2DH', 'BF8Dw0hZSt', 'vhoD7NJED6', 'OR79gyDp2a63Q4lIs4n', 'iYHJnZDCC1oaw488MSd'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, GXeif0HuBPgo98r8g5.csHigh entropy of concatenated method names: 'sT1BN4qcy6', 'XJyB5JJtwr', 'RUaBhooYvq', 'Ad7BSw16PN', 'ryABrxSgM7', 'Ci0BfS4iIo', 'FUYBp8LOE2', 'pRbBQRjUMA', 'YyTBtN1iHc', 'laTBjCXkn6'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, I7B6ZmAJgXiulq8aXx.csHigh entropy of concatenated method names: 'lnxWAlqfqE', 'cpkWGH7WWa', 'yIRWcNI7Qa', 'jp6W0R4YjZ', 'MeMWnYeTB7', 'hChWDUcqX5', 'EddWVAdyMS', 'qTgWXtPly4', 'W2lWvJASOu', 'ApHW9tLcxk'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, flnI6vh5F5KgJAmN7P.csHigh entropy of concatenated method names: 'eLC1GhF12p', 'cUR1ccRkeb', 'RUK10iF8iM', 'qH31nnEFCO', 'MeW1D79W9L', 'cXL1VXoaI6', 'Vdq1Xpg1Fj', 'U5S1vPHwx9', 'AKh19lkhH9', 'JFq1qL631H'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, ITXNkKfAkheJrLvZx7.csHigh entropy of concatenated method names: 'UH4wimUJjP', 'AUuwWLrZiO', 'ulEw8dYjKa', 'WDZwGRC4WK', 'KjHwcpH8Rw', 'uxAwnW9lGD', 'FCNwD3iN0H', 'zPk1y04V03', 'PSy14xtr4L', 'aVy1m2njYF'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, h95pLbcmrMYoSYW1aG.csHigh entropy of concatenated method names: 'rhPVguHuDB', 'C8MVlc5hI3', 'r6iVIHfkab', 'zduVbErpPx', 'pETVZJ43k1', 'EndV2ar9u2', 'tYwVCgrRSZ', 'rAjVTXc4Se', 'AlVVeFDM96', 'zJpVkp6MjT'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, oZmmcPlEf7Kr5ZTKIbS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'f9N7hfu4eJ', 'TF97S4V1uB', 'rsY7RBl6Fn', 'vfs7OhKwX3', 'ttD7Lr6Zcv', 'SUD7H8PM20', 'qxg7yWZ5yG'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, SPGrmyn7rOBCMQMeX2.csHigh entropy of concatenated method names: 'Dispose', 'mc5imJBDdf', 'fF5ur1x64Z', 'GoeooM1Wdu', 'BjkiaRoAgM', 'wavizPI04k', 'ProcessDialogKey', 'IJjudisl4x', 'sYxuivUD9t', 'zIluuLyn41'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, YYXEKSll4GrP51KGwta.csHigh entropy of concatenated method names: 'ToString', 'VoA7WF5Fgx', 'dpa78Wom02', 'hlE7ARHLxm', 'Skx7GIiaWV', 'KZy7c3NwM3', 'ImP70ZPEhY', 'aju7ndB8ht', 'n3wjWpgdCtrhm20f4Lm', 'njK48sg5vxf7eH6UUW9'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, ze31gmOsu8K2tIeLre.csHigh entropy of concatenated method names: 'n6rDAT4l6G', 'v8sDcujb3R', 'tP1DnhfGxF', 'ThyDVjSkFi', 'kNDDXriLhX', 'OyXnL20H0b', 'gdfnHrHx7Q', 'qkHnyJrIlm', 'fYen4w9lW4', 'pj0nmh2fV8'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, tDwXRAWWoZA8mpmZOi.csHigh entropy of concatenated method names: 'vcFVGSc2Xu', 'UfaV0CWkQf', 'llyVDNXL8Z', 'j1jDaKHhv8', 'T8pDzGA9Ta', 'STKVdDAPRx', 'FtXViLnbLj', 'RigVu7fJQx', 'HvEVWT2f6y', 'gg7V8wAWer'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, S4ua4hCf7fkEKsZcpl.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Bqoum7wdb5', 'mAYuamCwbZ', 'hkMuz0xVjA', 'JViWdhidIQ', 'pUSWinrPD1', 'd6vWuo5Wmi', 'CnMWWKhvr1', 'ETBUCeWI2GsYSN6Phx1'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, FQDATELQ9X9cFu3Qxc.csHigh entropy of concatenated method names: 'EqqchiLB86', 'P6TcSB6ibv', 'kr6cRCLTOC', 'fZWcO4nWFx', 'hTWcLEq2tg', 'rtXcHqR7Zy', 'oBFcyDqEaE', 'BYoc45jffF', 'w0bcmoKxP3', 'pfVcadN8fN'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, Ar37paihswt2Hn41S9.csHigh entropy of concatenated method names: 'ToString', 'bZTMFbE1QE', 'WlPMraL5Kh', 'YFtMfJrOS3', 'IDRMpK9It0', 'F3sMQYkhgB', 'sRoMtC5Cob', 'oOhMjGodq3', 'vUWMJGInYH', 'nvxM69JpvL'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, jHYSw6D7D1ChHFbXM1.csHigh entropy of concatenated method names: 'X5BP4MX2u2', 'JKFPaLeMqs', 'l5t1d1ZAwS', 'An11id9Hbx', 'jOPPFqTGNP', 'xrkP537F1h', 'vyuPY2kkKx', 'MR4PhdnkaZ', 'BssPSvjUfi', 'zqePRACpHa'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, btiZBU2WViW8aL0Z9p.csHigh entropy of concatenated method names: 'ST5iVHFkyL', 'oUQiXAALng', 'OVyi9Tk8mG', 'mIjiqoEbTL', 'wmMiBSXloa', 'BqyiMHoFHw', 'fDtwmmT5UQ2SNhIaJs', 'EK9u9rb3X4ems9V7Wm', 'qJfiiX8061', 'VGXiWTWBfW'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3dc1518.4.raw.unpack, Mt41L69jeJ6w3Bii6L.csHigh entropy of concatenated method names: 'YTgI1cbLg', 'AAmbJVSgZ', 'Rja24jStr', 'Tg2CZyDEY', 'Nvre2q6SW', 'jLkk77cZ6', 'CO2F00eJP934vG5WOw', 'wCP5FP5jAgwXuKHddk', 'WHiNZ0sryeB98cUNe4', 'ert1kqkRU'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, ybbGOTR1N80dNbk6Yv.csHigh entropy of concatenated method names: 'obcHojbACJ', 'YnKHTkWS94', 'V3UHNmonbN', 'AuPHVudqss', 'SJBHWK3PRm', 'wkNHA4K7Me', 'L35Hyg9bdX', 'n89HDZAL4k', 'OepHGjo5FD', 'MoeHJmlv16'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, LinkedList.csHigh entropy of concatenated method names: 'mn8lVDqlu', 'Uxue7aya3', 'KsFMnxhPk', 'ruSPXGSHZ', 'tdQBaRbij', 'ApGpyUtBu', 'Bm5j1f22p4rvC7Eu0G', 'yNLEN1RWrWr7H8C9D4', 'Dispose', 'MoveNext'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, Architectural.csHigh entropy of concatenated method names: 'Sort', 'Sort', 'u3bDyB9EB', 'jnVG6G0sx', 'NAaJ4PRFw', 'RestoreOriginalBitmap', 'Justy', 'mtp2IE8Nv', 'BfZIR9eYv', 'LowestBreakIteration'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'QEHEJ0ZEc', 'xWtkSmxXM', 'uUSoOZRtA', 'Dispose', 'yeRTIpRwj', 'r1YXj5fPVZm4y3Ug3f', 'K4LEmEBCcbAGHf4JhV', 'V6KVEyrTgoasGeD8Zb', 'ymWMMfbpAnyZ7dSZbA', 'IhZliPvmPYrV1280b1'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, wlMuNfYU9ETTr7SmU1.csHigh entropy of concatenated method names: 'vB7dgYlwIB5e4GotdD', 'h1qusDERcT8AOZTJmN', 'O9t3jXtovErCbWCOlE', 'QkAH1cPp6G', 'RgtTUJcyZL', 's7mHwaN5MT', 'n3AHmM6wxu', 'TUlH3q3EyS', 'XPxHXcdE1G', 'gX3mZCcRjff06'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, emPKJuT6ymTAqlrrUB.csHigh entropy of concatenated method names: 'GVT1sN4obB', 'MZe1rw9b82', 'm211fk8bKi', 'sFt1pvDVQX', 'fW51hPD7it', 'RXb1QdtEtt', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, aHpbjAzSkkTSQPnS7P.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'p26wEmLnU8', 'EUxwBEtvQd', 'MGFwM8JZ3I', 'B98wP1plWa', 'afMw1LK2KE', 'BuEwwiUbN2', 'qtYw7KaeRf'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, si6svfR3UjjFCtAc7T.csHigh entropy of concatenated method names: 'jFtnZbjna4', 'J4LnCHQ9xb', 'Xjf0fcGjEO', 'aWP0psQ3uK', 'O5y0QG5IH1', 'R4o0tkOkhh', 'piA0jkfVbp', 'Yqe0JypUP8', 'ePU06Aj9GN', 'GnZ0N0naPF'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, lWqnYBNWXpWhpF6WYV.csHigh entropy of concatenated method names: 'DnOETAXyEP', 'kKqEeBJFDd', 'KyJEs4OqRx', 'OeTErkYpu8', 'TGBEpo1no3', 'g8DEQv14mf', 'B6REj6hGqc', 'SjREJekgPd', 'aJVENiyYWd', 'jRvEFXQ4yk'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, T4MeU36M6kDM53dRDO.csHigh entropy of concatenated method names: 'Esn0bKvPRP', 'a6y022rw9m', 'orW0TNePdP', 'SJU0eE83F0', 'Bf50BxetkY', 'Y8u0MGhyeY', 'ysv0PR6Ktc', 'J9N019IOEU', 'r780wxDehe', 'coS074KGeW'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, KtCP0PlpQVTFkiyZbtF.csHigh entropy of concatenated method names: 'EIewg9v6Pd', 'WvKwlPaxeR', 'SafwIsBUu3', 'Gv7wbb6GDF', 'cK3wZnFxsJ', 'x8pw2YZU3v', 'Cp9wCMmsOS', 'RvHwTDkc38', 'yWRwefFykm', 'aZgwk5JmgM'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, EjwV8fVXT718mwuv65.csHigh entropy of concatenated method names: 'BWH1CyDrIBjHAiqmLqD', 'M4C5onDBXPFV1vtuxkK', 'zVjD1mx2DH', 'BF8Dw0hZSt', 'vhoD7NJED6', 'OR79gyDp2a63Q4lIs4n', 'iYHJnZDCC1oaw488MSd'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, GXeif0HuBPgo98r8g5.csHigh entropy of concatenated method names: 'sT1BN4qcy6', 'XJyB5JJtwr', 'RUaBhooYvq', 'Ad7BSw16PN', 'ryABrxSgM7', 'Ci0BfS4iIo', 'FUYBp8LOE2', 'pRbBQRjUMA', 'YyTBtN1iHc', 'laTBjCXkn6'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, I7B6ZmAJgXiulq8aXx.csHigh entropy of concatenated method names: 'lnxWAlqfqE', 'cpkWGH7WWa', 'yIRWcNI7Qa', 'jp6W0R4YjZ', 'MeMWnYeTB7', 'hChWDUcqX5', 'EddWVAdyMS', 'qTgWXtPly4', 'W2lWvJASOu', 'ApHW9tLcxk'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, flnI6vh5F5KgJAmN7P.csHigh entropy of concatenated method names: 'eLC1GhF12p', 'cUR1ccRkeb', 'RUK10iF8iM', 'qH31nnEFCO', 'MeW1D79W9L', 'cXL1VXoaI6', 'Vdq1Xpg1Fj', 'U5S1vPHwx9', 'AKh19lkhH9', 'JFq1qL631H'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, ITXNkKfAkheJrLvZx7.csHigh entropy of concatenated method names: 'UH4wimUJjP', 'AUuwWLrZiO', 'ulEw8dYjKa', 'WDZwGRC4WK', 'KjHwcpH8Rw', 'uxAwnW9lGD', 'FCNwD3iN0H', 'zPk1y04V03', 'PSy14xtr4L', 'aVy1m2njYF'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, h95pLbcmrMYoSYW1aG.csHigh entropy of concatenated method names: 'rhPVguHuDB', 'C8MVlc5hI3', 'r6iVIHfkab', 'zduVbErpPx', 'pETVZJ43k1', 'EndV2ar9u2', 'tYwVCgrRSZ', 'rAjVTXc4Se', 'AlVVeFDM96', 'zJpVkp6MjT'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, oZmmcPlEf7Kr5ZTKIbS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'f9N7hfu4eJ', 'TF97S4V1uB', 'rsY7RBl6Fn', 'vfs7OhKwX3', 'ttD7Lr6Zcv', 'SUD7H8PM20', 'qxg7yWZ5yG'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, SPGrmyn7rOBCMQMeX2.csHigh entropy of concatenated method names: 'Dispose', 'mc5imJBDdf', 'fF5ur1x64Z', 'GoeooM1Wdu', 'BjkiaRoAgM', 'wavizPI04k', 'ProcessDialogKey', 'IJjudisl4x', 'sYxuivUD9t', 'zIluuLyn41'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, YYXEKSll4GrP51KGwta.csHigh entropy of concatenated method names: 'ToString', 'VoA7WF5Fgx', 'dpa78Wom02', 'hlE7ARHLxm', 'Skx7GIiaWV', 'KZy7c3NwM3', 'ImP70ZPEhY', 'aju7ndB8ht', 'n3wjWpgdCtrhm20f4Lm', 'njK48sg5vxf7eH6UUW9'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, ze31gmOsu8K2tIeLre.csHigh entropy of concatenated method names: 'n6rDAT4l6G', 'v8sDcujb3R', 'tP1DnhfGxF', 'ThyDVjSkFi', 'kNDDXriLhX', 'OyXnL20H0b', 'gdfnHrHx7Q', 'qkHnyJrIlm', 'fYen4w9lW4', 'pj0nmh2fV8'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, tDwXRAWWoZA8mpmZOi.csHigh entropy of concatenated method names: 'vcFVGSc2Xu', 'UfaV0CWkQf', 'llyVDNXL8Z', 'j1jDaKHhv8', 'T8pDzGA9Ta', 'STKVdDAPRx', 'FtXViLnbLj', 'RigVu7fJQx', 'HvEVWT2f6y', 'gg7V8wAWer'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, S4ua4hCf7fkEKsZcpl.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Bqoum7wdb5', 'mAYuamCwbZ', 'hkMuz0xVjA', 'JViWdhidIQ', 'pUSWinrPD1', 'd6vWuo5Wmi', 'CnMWWKhvr1', 'ETBUCeWI2GsYSN6Phx1'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, FQDATELQ9X9cFu3Qxc.csHigh entropy of concatenated method names: 'EqqchiLB86', 'P6TcSB6ibv', 'kr6cRCLTOC', 'fZWcO4nWFx', 'hTWcLEq2tg', 'rtXcHqR7Zy', 'oBFcyDqEaE', 'BYoc45jffF', 'w0bcmoKxP3', 'pfVcadN8fN'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, Ar37paihswt2Hn41S9.csHigh entropy of concatenated method names: 'ToString', 'bZTMFbE1QE', 'WlPMraL5Kh', 'YFtMfJrOS3', 'IDRMpK9It0', 'F3sMQYkhgB', 'sRoMtC5Cob', 'oOhMjGodq3', 'vUWMJGInYH', 'nvxM69JpvL'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, jHYSw6D7D1ChHFbXM1.csHigh entropy of concatenated method names: 'X5BP4MX2u2', 'JKFPaLeMqs', 'l5t1d1ZAwS', 'An11id9Hbx', 'jOPPFqTGNP', 'xrkP537F1h', 'vyuPY2kkKx', 'MR4PhdnkaZ', 'BssPSvjUfi', 'zqePRACpHa'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, btiZBU2WViW8aL0Z9p.csHigh entropy of concatenated method names: 'ST5iVHFkyL', 'oUQiXAALng', 'OVyi9Tk8mG', 'mIjiqoEbTL', 'wmMiBSXloa', 'BqyiMHoFHw', 'fDtwmmT5UQ2SNhIaJs', 'EK9u9rb3X4ems9V7Wm', 'qJfiiX8061', 'VGXiWTWBfW'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.6f50000.8.raw.unpack, Mt41L69jeJ6w3Bii6L.csHigh entropy of concatenated method names: 'YTgI1cbLg', 'AAmbJVSgZ', 'Rja24jStr', 'Tg2CZyDEY', 'Nvre2q6SW', 'jLkk77cZ6', 'CO2F00eJP934vG5WOw', 'wCP5FP5jAgwXuKHddk', 'WHiNZ0sryeB98cUNe4', 'ert1kqkRU'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, ybbGOTR1N80dNbk6Yv.csHigh entropy of concatenated method names: 'obcHojbACJ', 'YnKHTkWS94', 'V3UHNmonbN', 'AuPHVudqss', 'SJBHWK3PRm', 'wkNHA4K7Me', 'L35Hyg9bdX', 'n89HDZAL4k', 'OepHGjo5FD', 'MoeHJmlv16'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, LinkedList.csHigh entropy of concatenated method names: 'mn8lVDqlu', 'Uxue7aya3', 'KsFMnxhPk', 'ruSPXGSHZ', 'tdQBaRbij', 'ApGpyUtBu', 'Bm5j1f22p4rvC7Eu0G', 'yNLEN1RWrWr7H8C9D4', 'Dispose', 'MoveNext'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, Architectural.csHigh entropy of concatenated method names: 'Sort', 'Sort', 'u3bDyB9EB', 'jnVG6G0sx', 'NAaJ4PRFw', 'RestoreOriginalBitmap', 'Justy', 'mtp2IE8Nv', 'BfZIR9eYv', 'LowestBreakIteration'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'QEHEJ0ZEc', 'xWtkSmxXM', 'uUSoOZRtA', 'Dispose', 'yeRTIpRwj', 'r1YXj5fPVZm4y3Ug3f', 'K4LEmEBCcbAGHf4JhV', 'V6KVEyrTgoasGeD8Zb', 'ymWMMfbpAnyZ7dSZbA', 'IhZliPvmPYrV1280b1'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, wlMuNfYU9ETTr7SmU1.csHigh entropy of concatenated method names: 'vB7dgYlwIB5e4GotdD', 'h1qusDERcT8AOZTJmN', 'O9t3jXtovErCbWCOlE', 'QkAH1cPp6G', 'RgtTUJcyZL', 's7mHwaN5MT', 'n3AHmM6wxu', 'TUlH3q3EyS', 'XPxHXcdE1G', 'gX3mZCcRjff06'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, ybbGOTR1N80dNbk6Yv.csHigh entropy of concatenated method names: 'obcHojbACJ', 'YnKHTkWS94', 'V3UHNmonbN', 'AuPHVudqss', 'SJBHWK3PRm', 'wkNHA4K7Me', 'L35Hyg9bdX', 'n89HDZAL4k', 'OepHGjo5FD', 'MoeHJmlv16'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, LinkedList.csHigh entropy of concatenated method names: 'mn8lVDqlu', 'Uxue7aya3', 'KsFMnxhPk', 'ruSPXGSHZ', 'tdQBaRbij', 'ApGpyUtBu', 'Bm5j1f22p4rvC7Eu0G', 'yNLEN1RWrWr7H8C9D4', 'Dispose', 'MoveNext'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, Architectural.csHigh entropy of concatenated method names: 'Sort', 'Sort', 'u3bDyB9EB', 'jnVG6G0sx', 'NAaJ4PRFw', 'RestoreOriginalBitmap', 'Justy', 'mtp2IE8Nv', 'BfZIR9eYv', 'LowestBreakIteration'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'QEHEJ0ZEc', 'xWtkSmxXM', 'uUSoOZRtA', 'Dispose', 'yeRTIpRwj', 'r1YXj5fPVZm4y3Ug3f', 'K4LEmEBCcbAGHf4JhV', 'V6KVEyrTgoasGeD8Zb', 'ymWMMfbpAnyZ7dSZbA', 'IhZliPvmPYrV1280b1'
              Source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, wlMuNfYU9ETTr7SmU1.csHigh entropy of concatenated method names: 'vB7dgYlwIB5e4GotdD', 'h1qusDERcT8AOZTJmN', 'O9t3jXtovErCbWCOlE', 'QkAH1cPp6G', 'RgtTUJcyZL', 's7mHwaN5MT', 'n3AHmM6wxu', 'TUlH3q3EyS', 'XPxHXcdE1G', 'gX3mZCcRjff06'
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile created: \dhl factura electronica pendiente documento no 04bb25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile created: \dhl factura electronica pendiente documento no 04bb25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile created: \dhl factura electronica pendiente documento no 04bb25083.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeFile created: \dhl factura electronica pendiente documento no 04bb25083.exeJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xEA
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: DHL Factura Electronica Pendiente documento No 04BB25083.exe PID: 7472, type: MEMORYSTR
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 0000000002D09904 second address: 0000000002D0990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 0000000002D09B6E second address: 0000000002D09B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: C20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 28F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 7760000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 8760000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 8910000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: 9910000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00409AA0 rdtsc 5_2_00409AA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6859Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1823Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2368Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 7567Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 879Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 865Jump to behavior
              Source: C:\Windows\SysWOW64\systray.exeWindow / User API: threadDelayed 1550Jump to behavior
              Source: C:\Windows\SysWOW64\systray.exeWindow / User API: threadDelayed 8420Jump to behavior
              Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-13943
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeAPI coverage: 1.7 %
              Source: C:\Windows\SysWOW64\systray.exeAPI coverage: 1.9 %
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe TID: 7500Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\explorer.exe TID: 6064Thread sleep count: 2368 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 6064Thread sleep time: -4736000s >= -30000sJump to behavior
              Source: C:\Windows\explorer.exe TID: 6064Thread sleep count: 7567 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 6064Thread sleep time: -15134000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\systray.exe TID: 8068Thread sleep count: 1550 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\systray.exe TID: 8068Thread sleep time: -3100000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\systray.exe TID: 8068Thread sleep count: 8420 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\systray.exe TID: 8068Thread sleep time: -16840000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\systray.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: explorer.exe, 00000006.00000002.3890474944.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000090DA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en\volume.inf_loc
              Source: explorer.exe, 00000006.00000000.1472350042.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
              Source: explorer.exe, 00000006.00000002.3891064279.0000000009290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009330000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}F
              Source: explorer.exe, 00000006.00000000.1472350042.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00=
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.0000000009255000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
              Source: explorer.exe, 00000006.00000002.3890474944.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000090DA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: explorer.exe, 00000006.00000000.1472350042.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
              Source: explorer.exe, 00000006.00000000.1481090991.0000000009330000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000006.00000002.3891064279.0000000009290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
              Source: explorer.exe, 00000006.00000000.1472350042.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_00409AA0 rdtsc 5_2_00409AA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0040ACE0 LdrLoadDll,5_2_0040ACE0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C019F mov eax, dword ptr fs:[00000030h]5_2_019C019F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C019F mov eax, dword ptr fs:[00000030h]5_2_019C019F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C019F mov eax, dword ptr fs:[00000030h]5_2_019C019F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C019F mov eax, dword ptr fs:[00000030h]5_2_019C019F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A197 mov eax, dword ptr fs:[00000030h]5_2_0193A197
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A197 mov eax, dword ptr fs:[00000030h]5_2_0193A197
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A197 mov eax, dword ptr fs:[00000030h]5_2_0193A197
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FC188 mov eax, dword ptr fs:[00000030h]5_2_019FC188
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FC188 mov eax, dword ptr fs:[00000030h]5_2_019FC188
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01980185 mov eax, dword ptr fs:[00000030h]5_2_01980185
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E4180 mov eax, dword ptr fs:[00000030h]5_2_019E4180
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E4180 mov eax, dword ptr fs:[00000030h]5_2_019E4180
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A161E5 mov eax, dword ptr fs:[00000030h]5_2_01A161E5
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE1D0 mov eax, dword ptr fs:[00000030h]5_2_019BE1D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE1D0 mov eax, dword ptr fs:[00000030h]5_2_019BE1D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE1D0 mov ecx, dword ptr fs:[00000030h]5_2_019BE1D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE1D0 mov eax, dword ptr fs:[00000030h]5_2_019BE1D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE1D0 mov eax, dword ptr fs:[00000030h]5_2_019BE1D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A061C3 mov eax, dword ptr fs:[00000030h]5_2_01A061C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A061C3 mov eax, dword ptr fs:[00000030h]5_2_01A061C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019701F8 mov eax, dword ptr fs:[00000030h]5_2_019701F8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EA118 mov ecx, dword ptr fs:[00000030h]5_2_019EA118
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EA118 mov eax, dword ptr fs:[00000030h]5_2_019EA118
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EA118 mov eax, dword ptr fs:[00000030h]5_2_019EA118
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EA118 mov eax, dword ptr fs:[00000030h]5_2_019EA118
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov ecx, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov ecx, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov ecx, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov eax, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE10E mov ecx, dword ptr fs:[00000030h]5_2_019EE10E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01970124 mov eax, dword ptr fs:[00000030h]5_2_01970124
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A00115 mov eax, dword ptr fs:[00000030h]5_2_01A00115
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946154 mov eax, dword ptr fs:[00000030h]5_2_01946154
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946154 mov eax, dword ptr fs:[00000030h]5_2_01946154
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193C156 mov eax, dword ptr fs:[00000030h]5_2_0193C156
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D8158 mov eax, dword ptr fs:[00000030h]5_2_019D8158
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D4144 mov eax, dword ptr fs:[00000030h]5_2_019D4144
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D4144 mov eax, dword ptr fs:[00000030h]5_2_019D4144
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D4144 mov ecx, dword ptr fs:[00000030h]5_2_019D4144
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D4144 mov eax, dword ptr fs:[00000030h]5_2_019D4144
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D4144 mov eax, dword ptr fs:[00000030h]5_2_019D4144
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A060B8 mov eax, dword ptr fs:[00000030h]5_2_01A060B8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A060B8 mov ecx, dword ptr fs:[00000030h]5_2_01A060B8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194208A mov eax, dword ptr fs:[00000030h]5_2_0194208A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D80A8 mov eax, dword ptr fs:[00000030h]5_2_019D80A8
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C20DE mov eax, dword ptr fs:[00000030h]5_2_019C20DE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193C0F0 mov eax, dword ptr fs:[00000030h]5_2_0193C0F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019820F0 mov ecx, dword ptr fs:[00000030h]5_2_019820F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A0E3 mov ecx, dword ptr fs:[00000030h]5_2_0193A0E3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C60E0 mov eax, dword ptr fs:[00000030h]5_2_019C60E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019480E9 mov eax, dword ptr fs:[00000030h]5_2_019480E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E016 mov eax, dword ptr fs:[00000030h]5_2_0195E016
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E016 mov eax, dword ptr fs:[00000030h]5_2_0195E016
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E016 mov eax, dword ptr fs:[00000030h]5_2_0195E016
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E016 mov eax, dword ptr fs:[00000030h]5_2_0195E016
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C4000 mov ecx, dword ptr fs:[00000030h]5_2_019C4000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E2000 mov eax, dword ptr fs:[00000030h]5_2_019E2000
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6030 mov eax, dword ptr fs:[00000030h]5_2_019D6030
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A020 mov eax, dword ptr fs:[00000030h]5_2_0193A020
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193C020 mov eax, dword ptr fs:[00000030h]5_2_0193C020
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01942050 mov eax, dword ptr fs:[00000030h]5_2_01942050
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6050 mov eax, dword ptr fs:[00000030h]5_2_019C6050
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196C073 mov eax, dword ptr fs:[00000030h]5_2_0196C073
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01938397 mov eax, dword ptr fs:[00000030h]5_2_01938397
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01938397 mov eax, dword ptr fs:[00000030h]5_2_01938397
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01938397 mov eax, dword ptr fs:[00000030h]5_2_01938397
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196438F mov eax, dword ptr fs:[00000030h]5_2_0196438F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196438F mov eax, dword ptr fs:[00000030h]5_2_0196438F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E388 mov eax, dword ptr fs:[00000030h]5_2_0193E388
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E388 mov eax, dword ptr fs:[00000030h]5_2_0193E388
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E388 mov eax, dword ptr fs:[00000030h]5_2_0193E388
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE3DB mov eax, dword ptr fs:[00000030h]5_2_019EE3DB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE3DB mov eax, dword ptr fs:[00000030h]5_2_019EE3DB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE3DB mov ecx, dword ptr fs:[00000030h]5_2_019EE3DB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EE3DB mov eax, dword ptr fs:[00000030h]5_2_019EE3DB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E43D4 mov eax, dword ptr fs:[00000030h]5_2_019E43D4
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E43D4 mov eax, dword ptr fs:[00000030h]5_2_019E43D4
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FC3CD mov eax, dword ptr fs:[00000030h]5_2_019FC3CD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A3C0 mov eax, dword ptr fs:[00000030h]5_2_0194A3C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019483C0 mov eax, dword ptr fs:[00000030h]5_2_019483C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019483C0 mov eax, dword ptr fs:[00000030h]5_2_019483C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019483C0 mov eax, dword ptr fs:[00000030h]5_2_019483C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019483C0 mov eax, dword ptr fs:[00000030h]5_2_019483C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C63C0 mov eax, dword ptr fs:[00000030h]5_2_019C63C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E3F0 mov eax, dword ptr fs:[00000030h]5_2_0195E3F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E3F0 mov eax, dword ptr fs:[00000030h]5_2_0195E3F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E3F0 mov eax, dword ptr fs:[00000030h]5_2_0195E3F0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019763FF mov eax, dword ptr fs:[00000030h]5_2_019763FF
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019503E9 mov eax, dword ptr fs:[00000030h]5_2_019503E9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193C310 mov ecx, dword ptr fs:[00000030h]5_2_0193C310
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01960310 mov ecx, dword ptr fs:[00000030h]5_2_01960310
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A30B mov eax, dword ptr fs:[00000030h]5_2_0197A30B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A30B mov eax, dword ptr fs:[00000030h]5_2_0197A30B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A30B mov eax, dword ptr fs:[00000030h]5_2_0197A30B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov eax, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov eax, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov eax, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov ecx, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov eax, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C035C mov eax, dword ptr fs:[00000030h]5_2_019C035C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E8350 mov ecx, dword ptr fs:[00000030h]5_2_019E8350
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C2349 mov eax, dword ptr fs:[00000030h]5_2_019C2349
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E437C mov eax, dword ptr fs:[00000030h]5_2_019E437C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0A352 mov eax, dword ptr fs:[00000030h]5_2_01A0A352
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E284 mov eax, dword ptr fs:[00000030h]5_2_0197E284
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E284 mov eax, dword ptr fs:[00000030h]5_2_0197E284
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C0283 mov eax, dword ptr fs:[00000030h]5_2_019C0283
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C0283 mov eax, dword ptr fs:[00000030h]5_2_019C0283
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C0283 mov eax, dword ptr fs:[00000030h]5_2_019C0283
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019502A0 mov eax, dword ptr fs:[00000030h]5_2_019502A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019502A0 mov eax, dword ptr fs:[00000030h]5_2_019502A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov eax, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov ecx, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov eax, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov eax, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov eax, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D62A0 mov eax, dword ptr fs:[00000030h]5_2_019D62A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A2C3 mov eax, dword ptr fs:[00000030h]5_2_0194A2C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A2C3 mov eax, dword ptr fs:[00000030h]5_2_0194A2C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A2C3 mov eax, dword ptr fs:[00000030h]5_2_0194A2C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A2C3 mov eax, dword ptr fs:[00000030h]5_2_0194A2C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A2C3 mov eax, dword ptr fs:[00000030h]5_2_0194A2C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019502E1 mov eax, dword ptr fs:[00000030h]5_2_019502E1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019502E1 mov eax, dword ptr fs:[00000030h]5_2_019502E1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019502E1 mov eax, dword ptr fs:[00000030h]5_2_019502E1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193823B mov eax, dword ptr fs:[00000030h]5_2_0193823B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193A250 mov eax, dword ptr fs:[00000030h]5_2_0193A250
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946259 mov eax, dword ptr fs:[00000030h]5_2_01946259
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FA250 mov eax, dword ptr fs:[00000030h]5_2_019FA250
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FA250 mov eax, dword ptr fs:[00000030h]5_2_019FA250
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C8243 mov eax, dword ptr fs:[00000030h]5_2_019C8243
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C8243 mov ecx, dword ptr fs:[00000030h]5_2_019C8243
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F0274 mov eax, dword ptr fs:[00000030h]5_2_019F0274
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944260 mov eax, dword ptr fs:[00000030h]5_2_01944260
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944260 mov eax, dword ptr fs:[00000030h]5_2_01944260
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944260 mov eax, dword ptr fs:[00000030h]5_2_01944260
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193826B mov eax, dword ptr fs:[00000030h]5_2_0193826B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E59C mov eax, dword ptr fs:[00000030h]5_2_0197E59C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01942582 mov eax, dword ptr fs:[00000030h]5_2_01942582
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01942582 mov ecx, dword ptr fs:[00000030h]5_2_01942582
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01974588 mov eax, dword ptr fs:[00000030h]5_2_01974588
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019645B1 mov eax, dword ptr fs:[00000030h]5_2_019645B1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019645B1 mov eax, dword ptr fs:[00000030h]5_2_019645B1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C05A7 mov eax, dword ptr fs:[00000030h]5_2_019C05A7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C05A7 mov eax, dword ptr fs:[00000030h]5_2_019C05A7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C05A7 mov eax, dword ptr fs:[00000030h]5_2_019C05A7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019465D0 mov eax, dword ptr fs:[00000030h]5_2_019465D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A5D0 mov eax, dword ptr fs:[00000030h]5_2_0197A5D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A5D0 mov eax, dword ptr fs:[00000030h]5_2_0197A5D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E5CF mov eax, dword ptr fs:[00000030h]5_2_0197E5CF
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E5CF mov eax, dword ptr fs:[00000030h]5_2_0197E5CF
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E5E7 mov eax, dword ptr fs:[00000030h]5_2_0196E5E7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019425E0 mov eax, dword ptr fs:[00000030h]5_2_019425E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C5ED mov eax, dword ptr fs:[00000030h]5_2_0197C5ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C5ED mov eax, dword ptr fs:[00000030h]5_2_0197C5ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6500 mov eax, dword ptr fs:[00000030h]5_2_019D6500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950535 mov eax, dword ptr fs:[00000030h]5_2_01950535
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14500 mov eax, dword ptr fs:[00000030h]5_2_01A14500
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E53E mov eax, dword ptr fs:[00000030h]5_2_0196E53E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E53E mov eax, dword ptr fs:[00000030h]5_2_0196E53E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E53E mov eax, dword ptr fs:[00000030h]5_2_0196E53E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E53E mov eax, dword ptr fs:[00000030h]5_2_0196E53E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E53E mov eax, dword ptr fs:[00000030h]5_2_0196E53E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948550 mov eax, dword ptr fs:[00000030h]5_2_01948550
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948550 mov eax, dword ptr fs:[00000030h]5_2_01948550
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197656A mov eax, dword ptr fs:[00000030h]5_2_0197656A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197656A mov eax, dword ptr fs:[00000030h]5_2_0197656A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197656A mov eax, dword ptr fs:[00000030h]5_2_0197656A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FA49A mov eax, dword ptr fs:[00000030h]5_2_019FA49A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019744B0 mov ecx, dword ptr fs:[00000030h]5_2_019744B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CA4B0 mov eax, dword ptr fs:[00000030h]5_2_019CA4B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019464AB mov eax, dword ptr fs:[00000030h]5_2_019464AB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019404E5 mov ecx, dword ptr fs:[00000030h]5_2_019404E5
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01978402 mov eax, dword ptr fs:[00000030h]5_2_01978402
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01978402 mov eax, dword ptr fs:[00000030h]5_2_01978402
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01978402 mov eax, dword ptr fs:[00000030h]5_2_01978402
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A430 mov eax, dword ptr fs:[00000030h]5_2_0197A430
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E420 mov eax, dword ptr fs:[00000030h]5_2_0193E420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E420 mov eax, dword ptr fs:[00000030h]5_2_0193E420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193E420 mov eax, dword ptr fs:[00000030h]5_2_0193E420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193C427 mov eax, dword ptr fs:[00000030h]5_2_0193C427
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C6420 mov eax, dword ptr fs:[00000030h]5_2_019C6420
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019FA456 mov eax, dword ptr fs:[00000030h]5_2_019FA456
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196245A mov eax, dword ptr fs:[00000030h]5_2_0196245A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193645D mov eax, dword ptr fs:[00000030h]5_2_0193645D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197E443 mov eax, dword ptr fs:[00000030h]5_2_0197E443
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196A470 mov eax, dword ptr fs:[00000030h]5_2_0196A470
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196A470 mov eax, dword ptr fs:[00000030h]5_2_0196A470
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196A470 mov eax, dword ptr fs:[00000030h]5_2_0196A470
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CC460 mov ecx, dword ptr fs:[00000030h]5_2_019CC460
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E678E mov eax, dword ptr fs:[00000030h]5_2_019E678E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019407AF mov eax, dword ptr fs:[00000030h]5_2_019407AF
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F47A0 mov eax, dword ptr fs:[00000030h]5_2_019F47A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194C7C0 mov eax, dword ptr fs:[00000030h]5_2_0194C7C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C07C3 mov eax, dword ptr fs:[00000030h]5_2_019C07C3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019447FB mov eax, dword ptr fs:[00000030h]5_2_019447FB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019447FB mov eax, dword ptr fs:[00000030h]5_2_019447FB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019627ED mov eax, dword ptr fs:[00000030h]5_2_019627ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019627ED mov eax, dword ptr fs:[00000030h]5_2_019627ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019627ED mov eax, dword ptr fs:[00000030h]5_2_019627ED
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CE7E1 mov eax, dword ptr fs:[00000030h]5_2_019CE7E1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940710 mov eax, dword ptr fs:[00000030h]5_2_01940710
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01970710 mov eax, dword ptr fs:[00000030h]5_2_01970710
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C700 mov eax, dword ptr fs:[00000030h]5_2_0197C700
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197273C mov eax, dword ptr fs:[00000030h]5_2_0197273C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197273C mov ecx, dword ptr fs:[00000030h]5_2_0197273C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197273C mov eax, dword ptr fs:[00000030h]5_2_0197273C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BC730 mov eax, dword ptr fs:[00000030h]5_2_019BC730
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C720 mov eax, dword ptr fs:[00000030h]5_2_0197C720
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C720 mov eax, dword ptr fs:[00000030h]5_2_0197C720
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CE75D mov eax, dword ptr fs:[00000030h]5_2_019CE75D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940750 mov eax, dword ptr fs:[00000030h]5_2_01940750
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982750 mov eax, dword ptr fs:[00000030h]5_2_01982750
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982750 mov eax, dword ptr fs:[00000030h]5_2_01982750
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C4755 mov eax, dword ptr fs:[00000030h]5_2_019C4755
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197674D mov esi, dword ptr fs:[00000030h]5_2_0197674D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197674D mov eax, dword ptr fs:[00000030h]5_2_0197674D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197674D mov eax, dword ptr fs:[00000030h]5_2_0197674D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948770 mov eax, dword ptr fs:[00000030h]5_2_01948770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950770 mov eax, dword ptr fs:[00000030h]5_2_01950770
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944690 mov eax, dword ptr fs:[00000030h]5_2_01944690
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944690 mov eax, dword ptr fs:[00000030h]5_2_01944690
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019766B0 mov eax, dword ptr fs:[00000030h]5_2_019766B0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C6A6 mov eax, dword ptr fs:[00000030h]5_2_0197C6A6
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A6C7 mov ebx, dword ptr fs:[00000030h]5_2_0197A6C7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A6C7 mov eax, dword ptr fs:[00000030h]5_2_0197A6C7
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE6F2 mov eax, dword ptr fs:[00000030h]5_2_019BE6F2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE6F2 mov eax, dword ptr fs:[00000030h]5_2_019BE6F2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE6F2 mov eax, dword ptr fs:[00000030h]5_2_019BE6F2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE6F2 mov eax, dword ptr fs:[00000030h]5_2_019BE6F2
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C06F1 mov eax, dword ptr fs:[00000030h]5_2_019C06F1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C06F1 mov eax, dword ptr fs:[00000030h]5_2_019C06F1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01982619 mov eax, dword ptr fs:[00000030h]5_2_01982619
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE609 mov eax, dword ptr fs:[00000030h]5_2_019BE609
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195260B mov eax, dword ptr fs:[00000030h]5_2_0195260B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195E627 mov eax, dword ptr fs:[00000030h]5_2_0195E627
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01976620 mov eax, dword ptr fs:[00000030h]5_2_01976620
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01978620 mov eax, dword ptr fs:[00000030h]5_2_01978620
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194262C mov eax, dword ptr fs:[00000030h]5_2_0194262C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0866E mov eax, dword ptr fs:[00000030h]5_2_01A0866E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0866E mov eax, dword ptr fs:[00000030h]5_2_01A0866E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0195C640 mov eax, dword ptr fs:[00000030h]5_2_0195C640
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01972674 mov eax, dword ptr fs:[00000030h]5_2_01972674
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A660 mov eax, dword ptr fs:[00000030h]5_2_0197A660
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A660 mov eax, dword ptr fs:[00000030h]5_2_0197A660
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C89B3 mov esi, dword ptr fs:[00000030h]5_2_019C89B3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C89B3 mov eax, dword ptr fs:[00000030h]5_2_019C89B3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C89B3 mov eax, dword ptr fs:[00000030h]5_2_019C89B3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019529A0 mov eax, dword ptr fs:[00000030h]5_2_019529A0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019409AD mov eax, dword ptr fs:[00000030h]5_2_019409AD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019409AD mov eax, dword ptr fs:[00000030h]5_2_019409AD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194A9D0 mov eax, dword ptr fs:[00000030h]5_2_0194A9D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019749D0 mov eax, dword ptr fs:[00000030h]5_2_019749D0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D69C0 mov eax, dword ptr fs:[00000030h]5_2_019D69C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019729F9 mov eax, dword ptr fs:[00000030h]5_2_019729F9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019729F9 mov eax, dword ptr fs:[00000030h]5_2_019729F9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0A9D3 mov eax, dword ptr fs:[00000030h]5_2_01A0A9D3
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CE9E0 mov eax, dword ptr fs:[00000030h]5_2_019CE9E0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01938918 mov eax, dword ptr fs:[00000030h]5_2_01938918
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01938918 mov eax, dword ptr fs:[00000030h]5_2_01938918
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CC912 mov eax, dword ptr fs:[00000030h]5_2_019CC912
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE908 mov eax, dword ptr fs:[00000030h]5_2_019BE908
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BE908 mov eax, dword ptr fs:[00000030h]5_2_019BE908
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C892A mov eax, dword ptr fs:[00000030h]5_2_019C892A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D892B mov eax, dword ptr fs:[00000030h]5_2_019D892B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019C0946 mov eax, dword ptr fs:[00000030h]5_2_019C0946
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CC97C mov eax, dword ptr fs:[00000030h]5_2_019CC97C
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E4978 mov eax, dword ptr fs:[00000030h]5_2_019E4978
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E4978 mov eax, dword ptr fs:[00000030h]5_2_019E4978
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01966962 mov eax, dword ptr fs:[00000030h]5_2_01966962
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01966962 mov eax, dword ptr fs:[00000030h]5_2_01966962
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01966962 mov eax, dword ptr fs:[00000030h]5_2_01966962
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0198096E mov eax, dword ptr fs:[00000030h]5_2_0198096E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0198096E mov edx, dword ptr fs:[00000030h]5_2_0198096E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0198096E mov eax, dword ptr fs:[00000030h]5_2_0198096E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CC89D mov eax, dword ptr fs:[00000030h]5_2_019CC89D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940887 mov eax, dword ptr fs:[00000030h]5_2_01940887
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0A8E4 mov eax, dword ptr fs:[00000030h]5_2_01A0A8E4
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196E8C0 mov eax, dword ptr fs:[00000030h]5_2_0196E8C0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C8F9 mov eax, dword ptr fs:[00000030h]5_2_0197C8F9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197C8F9 mov eax, dword ptr fs:[00000030h]5_2_0197C8F9
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CC810 mov eax, dword ptr fs:[00000030h]5_2_019CC810
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov eax, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov eax, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov eax, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov ecx, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov eax, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01962835 mov eax, dword ptr fs:[00000030h]5_2_01962835
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E483A mov eax, dword ptr fs:[00000030h]5_2_019E483A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E483A mov eax, dword ptr fs:[00000030h]5_2_019E483A
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197A830 mov eax, dword ptr fs:[00000030h]5_2_0197A830
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01970854 mov eax, dword ptr fs:[00000030h]5_2_01970854
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944859 mov eax, dword ptr fs:[00000030h]5_2_01944859
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01944859 mov eax, dword ptr fs:[00000030h]5_2_01944859
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01952840 mov ecx, dword ptr fs:[00000030h]5_2_01952840
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6870 mov eax, dword ptr fs:[00000030h]5_2_019D6870
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6870 mov eax, dword ptr fs:[00000030h]5_2_019D6870
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CE872 mov eax, dword ptr fs:[00000030h]5_2_019CE872
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CE872 mov eax, dword ptr fs:[00000030h]5_2_019CE872
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950BBE mov eax, dword ptr fs:[00000030h]5_2_01950BBE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950BBE mov eax, dword ptr fs:[00000030h]5_2_01950BBE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F4BB0 mov eax, dword ptr fs:[00000030h]5_2_019F4BB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F4BB0 mov eax, dword ptr fs:[00000030h]5_2_019F4BB0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EEBD0 mov eax, dword ptr fs:[00000030h]5_2_019EEBD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940BCD mov eax, dword ptr fs:[00000030h]5_2_01940BCD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940BCD mov eax, dword ptr fs:[00000030h]5_2_01940BCD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940BCD mov eax, dword ptr fs:[00000030h]5_2_01940BCD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01960BCB mov eax, dword ptr fs:[00000030h]5_2_01960BCB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01960BCB mov eax, dword ptr fs:[00000030h]5_2_01960BCB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01960BCB mov eax, dword ptr fs:[00000030h]5_2_01960BCB
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948BF0 mov eax, dword ptr fs:[00000030h]5_2_01948BF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948BF0 mov eax, dword ptr fs:[00000030h]5_2_01948BF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948BF0 mov eax, dword ptr fs:[00000030h]5_2_01948BF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196EBFC mov eax, dword ptr fs:[00000030h]5_2_0196EBFC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CCBF0 mov eax, dword ptr fs:[00000030h]5_2_019CCBF0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BEB1D mov eax, dword ptr fs:[00000030h]5_2_019BEB1D
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A08B28 mov eax, dword ptr fs:[00000030h]5_2_01A08B28
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A08B28 mov eax, dword ptr fs:[00000030h]5_2_01A08B28
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196EB20 mov eax, dword ptr fs:[00000030h]5_2_0196EB20
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196EB20 mov eax, dword ptr fs:[00000030h]5_2_0196EB20
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EEB50 mov eax, dword ptr fs:[00000030h]5_2_019EEB50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F4B4B mov eax, dword ptr fs:[00000030h]5_2_019F4B4B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019F4B4B mov eax, dword ptr fs:[00000030h]5_2_019F4B4B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019E8B42 mov eax, dword ptr fs:[00000030h]5_2_019E8B42
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6B40 mov eax, dword ptr fs:[00000030h]5_2_019D6B40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019D6B40 mov eax, dword ptr fs:[00000030h]5_2_019D6B40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A0AB40 mov eax, dword ptr fs:[00000030h]5_2_01A0AB40
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0193CB7E mov eax, dword ptr fs:[00000030h]5_2_0193CB7E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01978A90 mov edx, dword ptr fs:[00000030h]5_2_01978A90
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0194EA80 mov eax, dword ptr fs:[00000030h]5_2_0194EA80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14A80 mov eax, dword ptr fs:[00000030h]5_2_01A14A80
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948AA0 mov eax, dword ptr fs:[00000030h]5_2_01948AA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01948AA0 mov eax, dword ptr fs:[00000030h]5_2_01948AA0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01996AA4 mov eax, dword ptr fs:[00000030h]5_2_01996AA4
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01940AD0 mov eax, dword ptr fs:[00000030h]5_2_01940AD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01974AD0 mov eax, dword ptr fs:[00000030h]5_2_01974AD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01974AD0 mov eax, dword ptr fs:[00000030h]5_2_01974AD0
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01996ACC mov eax, dword ptr fs:[00000030h]5_2_01996ACC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01996ACC mov eax, dword ptr fs:[00000030h]5_2_01996ACC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01996ACC mov eax, dword ptr fs:[00000030h]5_2_01996ACC
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197AAEE mov eax, dword ptr fs:[00000030h]5_2_0197AAEE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197AAEE mov eax, dword ptr fs:[00000030h]5_2_0197AAEE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019CCA11 mov eax, dword ptr fs:[00000030h]5_2_019CCA11
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01964A35 mov eax, dword ptr fs:[00000030h]5_2_01964A35
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01964A35 mov eax, dword ptr fs:[00000030h]5_2_01964A35
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CA38 mov eax, dword ptr fs:[00000030h]5_2_0197CA38
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CA24 mov eax, dword ptr fs:[00000030h]5_2_0197CA24
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0196EA2E mov eax, dword ptr fs:[00000030h]5_2_0196EA2E
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01946A50 mov eax, dword ptr fs:[00000030h]5_2_01946A50
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950A5B mov eax, dword ptr fs:[00000030h]5_2_01950A5B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01950A5B mov eax, dword ptr fs:[00000030h]5_2_01950A5B
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BCA72 mov eax, dword ptr fs:[00000030h]5_2_019BCA72
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019BCA72 mov eax, dword ptr fs:[00000030h]5_2_019BCA72
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CA6F mov eax, dword ptr fs:[00000030h]5_2_0197CA6F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CA6F mov eax, dword ptr fs:[00000030h]5_2_0197CA6F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CA6F mov eax, dword ptr fs:[00000030h]5_2_0197CA6F
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_019EEA60 mov eax, dword ptr fs:[00000030h]5_2_019EEA60
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A14DAD mov eax, dword ptr fs:[00000030h]5_2_01A14DAD
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A08DAE mov eax, dword ptr fs:[00000030h]5_2_01A08DAE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01A08DAE mov eax, dword ptr fs:[00000030h]5_2_01A08DAE
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CDB1 mov ecx, dword ptr fs:[00000030h]5_2_0197CDB1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CDB1 mov eax, dword ptr fs:[00000030h]5_2_0197CDB1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_0197CDB1 mov eax, dword ptr fs:[00000030h]5_2_0197CDB1
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeCode function: 5_2_01968DBF mov eax, dword ptr fs:[00000030h]5_2_01968DBF
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeMemory written: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: NULL target: C:\Windows\SysWOW64\systray.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection loaded: NULL target: C:\Windows\SysWOW64\systray.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeThread register set: target process: 4084Jump to behavior
              Source: C:\Windows\SysWOW64\systray.exeThread register set: target process: 4084Jump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeSection unmapped: C:\Windows\SysWOW64\systray.exe base address: B0000Jump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeProcess created: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeJump to behavior
              Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe"Jump to behavior
              Source: explorer.exe, 00000006.00000000.1477075584.00000000044D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1472807052.0000000001090000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000003.3076771990.000000000936E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000006.00000000.1472807052.0000000001090000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3884453822.0000000000A20000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1472350042.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000006.00000000.1472807052.0000000001090000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3884925137.0000000001090000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
              Source: explorer.exe, 00000006.00000000.1472807052.0000000001090000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3884925137.0000000001090000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: explorer.exe, 00000006.00000003.3076771990.000000000936E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285276911.000000000936E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.000000000936E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd]1Q
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1469792389.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1473298429.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1473432091.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1467009069.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1467009069.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a138d0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.5370000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.2a238e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.3a03790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.53a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DHL Factura Electronica Pendiente documento No 04BB25083.exe.39e9970.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1469792389.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1473298429.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1473432091.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1467009069.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1467009069.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Shared Modules
              1
              DLL Side-Loading
              512
              Process Injection
              1
              Rootkit
              1
              Credential API Hooking
              121
              Security Software Discovery
              Remote Services1
              Credential API Hooking
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Masquerading
              LSASS Memory2
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Disable or Modify Tools
              Security Account Manager41
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook41
              Virtualization/Sandbox Evasion
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script512
              Process Injection
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Deobfuscate/Decode Files or Information
              Cached Domain Credentials112
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
              Obfuscated Files or Information
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
              Software Packing
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              DLL Side-Loading
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1396156 Sample: DHL Factura Electronica Pen... Startdate: 21/02/2024 Architecture: WINDOWS Score: 100 31 www.bigtexture.xyz 2->31 33 www.yassa-hany.online 2->33 35 12 other IPs or domains 2->35 43 Snort IDS alert for network traffic 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Found malware configuration 2->47 51 16 other signatures 2->51 11 DHL Factura Electronica Pendiente documento No 04BB25083.exe 4 2->11         started        signatures3 49 Performs DNS queries to domains with low reputation 31->49 process4 signatures5 59 Adds a directory exclusion to Windows Defender 11->59 61 Injects a PE file into a foreign processes 11->61 14 DHL Factura Electronica Pendiente documento No 04BB25083.exe 11->14         started        17 powershell.exe 22 11->17         started        process6 signatures7 63 Modifies the context of a thread in another process (thread injection) 14->63 65 Maps a DLL or memory area into another process 14->65 67 Sample uses process hollowing technique 14->67 69 Queues an APC in another process (thread injection) 14->69 19 explorer.exe 58 1 14->19 injected 22 conhost.exe 17->22         started        process8 dnsIp9 37 www.yassa-hany.online 103.224.212.213, 49722, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 19->37 39 quickfibrokers.com 15.197.142.173, 49720, 80 TANDEMUS United States 19->39 41 4 other IPs or domains 19->41 24 systray.exe 19->24         started        process10 signatures11 53 Modifies the context of a thread in another process (thread injection) 24->53 55 Maps a DLL or memory area into another process 24->55 57 Tries to detect virtualization through RDTSC time measurements 24->57 27 cmd.exe 1 24->27         started        process12 process13 29 conhost.exe 27->29         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              DHL Factura Electronica Pendiente documento No 04BB25083.exe34%ReversingLabsWin32.Trojan.Generic
              DHL Factura Electronica Pendiente documento No 04BB25083.exe41%VirustotalBrowse
              DHL Factura Electronica Pendiente documento No 04BB25083.exe100%AviraHEUR/AGEN.1306292
              DHL Factura Electronica Pendiente documento No 04BB25083.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              quickfibrokers.com5%VirustotalBrowse
              rdlva.com1%VirustotalBrowse
              taxibactrungnam.com1%VirustotalBrowse
              www.yassa-hany.online0%VirustotalBrowse
              td-ccm-neg-87-45.wixdns.net0%VirustotalBrowse
              www.baerana.com0%VirustotalBrowse
              www.rdlva.com1%VirustotalBrowse
              www.bigtexture.xyz0%VirustotalBrowse
              www.quickfibrokers.com0%VirustotalBrowse
              www.taxibactrungnam.com1%VirustotalBrowse
              www.permanentday.space3%VirustotalBrowse
              www.usetruerreview.com0%VirustotalBrowse
              www.ae-skinlab.com0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://powerpoint.office.comer0%URL Reputationsafe
              http://www.microsoft.c0%URL Reputationsafe
              http://schemas.micro0%URL Reputationsafe
              http://ns.adobeS0%URL Reputationsafe
              http://www.c2help.liveReferer:0%Avira URL Cloudsafe
              http://www.papermoonnursery.com/pz08/www.anti-theft-device-82641.bond0%Avira URL Cloudsafe
              http://www.permanentday.space3%VirustotalBrowse
              http://www.baerana.com/pz08/1%VirustotalBrowse
              http://www.aloyoga-uae.com/pz08/11%VirustotalBrowse
              http://www.permanentday.space100%Avira URL Cloudmalware
              http://www.aloyoga-uae.com/pz08/100%Avira URL Cloudphishing
              http://www.baerana.com/pz08/0%Avira URL Cloudsafe
              http://www.phdop.xyz/pz08/www.quickfibrokers.com100%Avira URL Cloudphishing
              http://www.baerana.com/pz08/www.yassa-hany.online0%Avira URL Cloudsafe
              http://www.taxibactrungnam.comReferer:0%Avira URL Cloudsafe
              http://www.itkagear.com0%Avira URL Cloudsafe
              http://www.ae-skinlab.com/pz08/100%Avira URL Cloudmalware
              http://www.yassa-hany.onlineReferer:0%Avira URL Cloudsafe
              http://www.rdlva.comReferer:0%Avira URL Cloudsafe
              www.rdlva.com/pz08/0%Avira URL Cloudsafe
              http://www.itkagear.com/pz08/www.jenstandsforarkansas.com100%Avira URL Cloudmalware
              http://www.itkagear.com0%VirustotalBrowse
              http://www.itkagear.com/pz08/100%Avira URL Cloudmalware
              http://www.jenstandsforarkansas.com/pz08/0%Avira URL Cloudsafe
              http://www.bigtexture.xyz0%Avira URL Cloudsafe
              www.rdlva.com/pz08/3%VirustotalBrowse
              http://www.itkagear.com/pz08/0%VirustotalBrowse
              http://www.quickfibrokers.com/pz08/100%Avira URL Cloudmalware
              http://www.bigtexture.xyz/pz08/www.baerana.com100%Avira URL Cloudphishing
              http://www.itkagear.com/pz08/www.jenstandsforarkansas.com0%VirustotalBrowse
              http://www.quickfibrokers.comReferer:0%Avira URL Cloudsafe
              http://www.ae-skinlab.com/pz08/0%VirustotalBrowse
              http://www.usetruerreview.com/pz08/0%Avira URL Cloudsafe
              http://www.bigtexture.xyz0%VirustotalBrowse
              http://www.jenstandsforarkansas.com/pz08/1%VirustotalBrowse
              http://www.quickfibrokers.com/pz08/0%VirustotalBrowse
              http://www.baerana.com/pz08/?Ap=iUtqEraofiOoamAGmz9y1BZqdP67NXRhW/u/s4hsis3XwB7pF+A9OlO8MXjIW5A/mozx&N6Ahw=3ffl2F0Punah420%Avira URL Cloudsafe
              http://www.usetruerreview.com/pz08/0%VirustotalBrowse
              http://www.baerana.comReferer:0%Avira URL Cloudsafe
              http://www.papermoonnursery.comReferer:0%Avira URL Cloudsafe
              http://www.phdop.xyz0%Avira URL Cloudsafe
              http://www.aloyoga-uae.comReferer:0%Avira URL Cloudsafe
              http://www.quickfibrokers.com/pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42100%Avira URL Cloudmalware
              http://www.taxibactrungnam.com/pz08/?Ap=bKUMdxsXbZ20XGxWaFGGS8S5qdUvksLLWvMweKpTgT2MARQxqrmnXGgSr/TayxAxMgg2&N6Ahw=3ffl2F0Punah420%Avira URL Cloudsafe
              http://www.ae-skinlab.com0%Avira URL Cloudsafe
              http://www.papermoonnursery.com0%Avira URL Cloudsafe
              http://www.anti-theft-device-82641.bond/pz08/0%Avira URL Cloudsafe
              http://www.bigtexture.xyz/pz08/100%Avira URL Cloudphishing
              http://www.phdop.xyz0%VirustotalBrowse
              http://www.c2help.live/pz08/100%Avira URL Cloudmalware
              http://www.yassa-hany.online0%Avira URL Cloudsafe
              http://www.papermoonnursery.com0%VirustotalBrowse
              http://www.papermoonnursery.com/pz08/0%Avira URL Cloudsafe
              http://www.yassa-hany.online/pz08/www.taxibactrungnam.com0%Avira URL Cloudsafe
              http://www.anti-theft-device-82641.bond/pz08/0%VirustotalBrowse
              http://www.itkagear.comReferer:0%Avira URL Cloudsafe
              http://www.rdlva.com0%Avira URL Cloudsafe
              http://www.bigtexture.xyz/pz08/1%VirustotalBrowse
              http://www.ae-skinlab.com0%VirustotalBrowse
              http://www.jenstandsforarkansas.com0%Avira URL Cloudsafe
              http://www.c2help.live/pz08/2%VirustotalBrowse
              http://www.permanentday.space/pz08/www.usetruerreview.com100%Avira URL Cloudmalware
              http://www.quickfibrokers.com100%Avira URL Cloudmalware
              http://www.taxibactrungnam.com0%Avira URL Cloudsafe
              http://www.jenstandsforarkansas.com1%VirustotalBrowse
              http://www.bigtexture.xyzReferer:0%Avira URL Cloudsafe
              http://www.yassa-hany.online0%VirustotalBrowse
              http://www.rdlva.com1%VirustotalBrowse
              http://www.quickfibrokers.com/pz08/www.permanentday.space100%Avira URL Cloudmalware
              http://www.papermoonnursery.com/pz08/0%VirustotalBrowse
              http://www.usetruerreview.comReferer:0%Avira URL Cloudsafe
              http://www.permanentday.space/pz08/100%Avira URL Cloudmalware
              http://www.quickfibrokers.com0%VirustotalBrowse
              http://www.ae-skinlab.com/pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42100%Avira URL Cloudmalware
              http://www.usetruerreview.com0%Avira URL Cloudsafe
              http://www.taxibactrungnam.com/pz08/0%Avira URL Cloudsafe
              http://www.yassa-hany.online/pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiR0%Avira URL Cloudsafe
              http://www.ae-skinlab.comReferer:0%Avira URL Cloudsafe
              http://www.jenstandsforarkansas.com/pz08/www.aloyoga-uae.com0%Avira URL Cloudsafe
              http://www.rdlva.com/pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+0%Avira URL Cloudsafe
              http://www.rdlva.com/pz08/www.ae-skinlab.com0%Avira URL Cloudsafe
              http://www.usetruerreview.com/pz08/www.bigtexture.xyz0%Avira URL Cloudsafe
              http://www.c2help.live/pz08/www.papermoonnursery.com100%Avira URL Cloudmalware
              http://www.phdop.xyzReferer:0%Avira URL Cloudsafe
              http://www.anti-theft-device-82641.bond0%Avira URL Cloudsafe
              http://www.c2help.live100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              quickfibrokers.com
              15.197.142.173
              truetrueunknown
              rdlva.com
              3.33.130.190
              truetrueunknown
              taxibactrungnam.com
              103.167.199.20
              truetrueunknown
              www.yassa-hany.online
              103.224.212.213
              truetrueunknown
              td-ccm-neg-87-45.wixdns.net
              34.149.87.45
              truetrueunknown
              www.baerana.com
              91.195.240.117
              truetrueunknown
              www.usetruerreview.com
              unknown
              unknowntrueunknown
              www.bigtexture.xyz
              unknown
              unknowntrueunknown
              www.rdlva.com
              unknown
              unknowntrueunknown
              www.taxibactrungnam.com
              unknown
              unknowntrueunknown
              www.permanentday.space
              unknown
              unknowntrueunknown
              www.ae-skinlab.com
              unknown
              unknowntrueunknown
              www.quickfibrokers.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              www.rdlva.com/pz08/true
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              low
              http://www.baerana.com/pz08/?Ap=iUtqEraofiOoamAGmz9y1BZqdP67NXRhW/u/s4hsis3XwB7pF+A9OlO8MXjIW5A/mozx&N6Ahw=3ffl2F0Punah42true
              • Avira URL Cloud: safe
              unknown
              http://www.quickfibrokers.com/pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42true
              • Avira URL Cloud: malware
              unknown
              http://www.taxibactrungnam.com/pz08/?Ap=bKUMdxsXbZ20XGxWaFGGS8S5qdUvksLLWvMweKpTgT2MARQxqrmnXGgSr/TayxAxMgg2&N6Ahw=3ffl2F0Punah42true
              • Avira URL Cloud: safe
              unknown
              http://www.ae-skinlab.com/pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42true
              • Avira URL Cloud: malware
              unknown
              http://www.yassa-hany.online/pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiRtrue
              • Avira URL Cloud: safe
              unknown
              http://www.rdlva.com/pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://powerpoint.office.comerexplorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.papermoonnursery.com/pz08/www.anti-theft-device-82641.bondexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://android.notify.windows.com/iOSA4explorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://www.c2help.liveReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://www.permanentday.spaceexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.phdop.xyz/pz08/www.quickfibrokers.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000006.00000003.2284484234.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3890474944.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://www.baerana.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.aloyoga-uae.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                      • 11%, Virustotal, Browse
                      • Avira URL Cloud: phishing
                      unknown
                      https://excel.office.comexplorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.baerana.com/pz08/www.yassa-hany.onlineexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.taxibactrungnam.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.itkagear.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.ae-skinlab.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.yassa-hany.onlineReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.rdlva.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.itkagear.com/pz08/www.jenstandsforarkansas.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: malware
                          unknown
                          https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zealexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://www.itkagear.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.microsoft.cexplorer.exe, 00000006.00000003.2284484234.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3077349116.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3891064279.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.0000000009237000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDHL Factura Electronica Pendiente documento No 04BB25083.exe, 00000000.00000002.1467009069.0000000002A23000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jenstandsforarkansas.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://android.notify.windows.com/iOSdexplorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://www.bigtexture.xyzexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsiexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://www.quickfibrokers.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.bigtexture.xyz/pz08/www.baerana.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: phishing
                                  unknown
                                  http://www.quickfibrokers.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.usetruerreview.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        https://outlook.comexplorer.exe, 00000006.00000000.1487556831.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://www.papermoonnursery.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.baerana.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.phdop.xyzexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.aloyoga-uae.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://android.notify.windows.com/iOSexplorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://www.ae-skinlab.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.papermoonnursery.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000006.00000003.2809145354.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285909149.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3894874873.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BC80000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgexplorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.anti-theft-device-82641.bond/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBAexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandinexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.bigtexture.xyz/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: phishing
                                                      unknown
                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-darkexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.c2help.live/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • 2%, Virustotal, Browse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://www.yassa-hany.onlineexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • 0%, Virustotal, Browse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000006.00000002.3890474944.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1481090991.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2284484234.00000000090DA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.papermoonnursery.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • 0%, Virustotal, Browse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.yassa-hany.online/pz08/www.taxibactrungnam.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.itkagear.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.rdlva.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • 1%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://img.sedoparking.comexplorer.exe, 00000006.00000002.3901744709.0000000010E5F000.00000004.80000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3885851208.00000000056BF000.00000004.10000000.00040000.00000000.sdmpfalse
                                                              high
                                                              https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.jenstandsforarkansas.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • 1%, Virustotal, Browse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.permanentday.space/pz08/www.usetruerreview.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.microexplorer.exe, 00000006.00000002.3889073866.0000000007720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1473566211.0000000002C80000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1479452391.0000000007710000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svgexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://wns.windows.com/EM0explorer.exe, 00000006.00000003.2285909149.000000000BDF5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2809145354.000000000BDF5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1487556831.000000000BDF5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.quickfibrokers.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • 0%, Virustotal, Browse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        http://www.taxibactrungnam.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.bigtexture.xyzReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.quickfibrokers.com/pz08/www.permanentday.spaceexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://www.usetruerreview.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.permanentday.space/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://www.usetruerreview.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.taxibactrungnam.com/pz08/explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09explorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-alexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9kexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.ae-skinlab.comReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.jenstandsforarkansas.com/pz08/www.aloyoga-uae.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.rdlva.com/pz08/www.ae-skinlab.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.usetruerreview.com/pz08/www.bigtexture.xyzexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.c2help.live/pz08/www.papermoonnursery.comexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    http://www.phdop.xyzReferer:explorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://ns.adobeSexplorer.exe, 00000006.00000000.1476006897.0000000004405000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3886674045.0000000004405000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    http://www.anti-theft-device-82641.bondexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.c2help.liveexplorer.exe, 00000006.00000002.3898511291.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-darkexplorer.exe, 00000006.00000000.1477551956.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3887497941.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2285572521.0000000006F30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.sedo.com/services/parking.php3explorer.exe, 00000006.00000002.3901744709.0000000010E5F000.00000004.80000000.00040000.00000000.sdmp, systray.exe, 00000007.00000002.3885851208.00000000056BF000.00000004.10000000.00040000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        91.195.240.117
                                                                                        www.baerana.comGermany
                                                                                        47846SEDO-ASDEtrue
                                                                                        103.224.212.213
                                                                                        www.yassa-hany.onlineAustralia
                                                                                        133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
                                                                                        15.197.142.173
                                                                                        quickfibrokers.comUnited States
                                                                                        7430TANDEMUStrue
                                                                                        103.167.199.20
                                                                                        taxibactrungnam.comunknown
                                                                                        7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
                                                                                        34.149.87.45
                                                                                        td-ccm-neg-87-45.wixdns.netUnited States
                                                                                        2686ATGS-MMD-ASUStrue
                                                                                        3.33.130.190
                                                                                        rdlva.comUnited States
                                                                                        8987AMAZONEXPANSIONGBtrue
                                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                                        Analysis ID:1396156
                                                                                        Start date and time:2024-02-21 14:33:12 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 11m 48s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:15
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:1
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.evad.winEXE@11/6@10/6
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 97%
                                                                                        • Number of executed functions: 139
                                                                                        • Number of non-executed functions: 291
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                        • Report size getting too big, too many NtOpenKey calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        TimeTypeDescription
                                                                                        14:34:07API Interceptor1x Sleep call for process: DHL Factura Electronica Pendiente documento No 04BB25083.exe modified
                                                                                        14:34:13API Interceptor13x Sleep call for process: powershell.exe modified
                                                                                        14:34:20API Interceptor7361891x Sleep call for process: explorer.exe modified
                                                                                        14:35:00API Interceptor7144066x Sleep call for process: systray.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        91.195.240.117DHL Express_5047270226.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.artcitytheatre.com/3a3w/
                                                                                        DHL Receipt_2048094227.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.artcitytheatre.com/nk2s/
                                                                                        rN__089734.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • www.artcitytheatre.com/v3ka/
                                                                                        Modiolus.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • www.foundationtest.site/m9so/
                                                                                        FedEx_AWB#53053752046.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.artcitytheatre.com/nk2s/
                                                                                        DHL_AWB# 5047292261.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.artcitytheatre.com/3a3w/
                                                                                        EJ9wbX3RFyX19aq.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.boatnirvanalife.com/cz30/
                                                                                        DHL_AWB# 5047232261.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.artcitytheatre.com/3a3w/
                                                                                        rBancofiecompro.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.grammarhome.com/pz08/?rDKp5F=+6acTchy+21dSWg2OiyP/FObd5J3Ivex+uKPSgZBZTtt/Ockf0QycLcZZIKIlef0Nr1J&pPf=kDK0IBv8Nx6
                                                                                        Supplier Compliance Purchase order PO 2135850 QTNIU81408875 20240215.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.grammarhome.com/pz08/?00Gxhfs=+6acTcgG+WwtPm9CSSyP/FObd5J3Ivex+uKPSgZBZTtt/Ockf0QycLcZZLqy1P/MXMUO&EjP=0R-HePyHyFdHq6RP
                                                                                        103.224.212.213PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                                                                                        • searchseedphase.online/bot/regex
                                                                                        PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                                                                                        • searchseedphase.online/bot/regex
                                                                                        Documento de confirmacion de orden de compra OC 1580070060.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.yassa-hany.online/pz08/?mzrPV4R=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuMVpBqNDhq+c&Rl=8pFP0r98Chvt5p5P
                                                                                        2024-09C33T37.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.jeffwertdesign.com/ve92/?K2M8bVC=FFlo4/TKNXAR7V12oAudCGusg/tK2zFE/4uuQQ9Wgy0sGP4AKi+QV1PLyZgh2gAJGU7I&tXC=BDK02VJ87dHtUzo
                                                                                        rBCPcomprobante.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.yassa-hany.online/pz08/?CrFT7j=ftx8Clc09Ned3F&pR-l7PfH=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuMVQNLhAw6fb
                                                                                        Proforma_Invoice.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                        • www.epansion.com/ao65/?BR-hMX=rvO+ATiOvXVjo/S2H7FppiqdWdEaFhxw3FA4xmox9z3FoZLInDsOyhar+a5ltJSnpB6j&Gzu=sFNxH
                                                                                        003425425124526.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                        • www.epansion.com/ao65/?GR0=rvO+ATiOvXVjo/S2H7FppiqdWdEaFhxw3FA4xmox9z3FoZLInDsOyhar+atqjoikrWmu&IDK=RJBh5RS0IZO8zhrP
                                                                                        Nuevo_orden_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.themicheline.com/g11y/?4hOl=Q/yQLYVAGKkMZrnE0iOJNdDJIeKID0+EwORul+wPjaygN5L5fjaaMR6aEX0pRQDKm1/B&l2Mt_N=fTAlQTwhPDH
                                                                                        Hubnnuiisapctu.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                        • www.epansion.com/ao65/?2d=rvO+ATiOvXVjo/S2H7FppiqdWdEaFhxw3FA4xmox9z3FoZLInDsOyhar+ZVDqIufkgb4a3XCnQ==&3fC=vZeTzRlX84SHE
                                                                                        15.197.142.173MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                        • veselcontractors.com/pma/
                                                                                        rEncomendarPDF.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • www.magiccarpet-ride.com/ge22/?GxoX=5+uINVVgHWl4OpIYki5JTJ8/JA9Xhhy7bPh3OZNS8e32NQo31PLkDzGWAjp7srORSYYgrbq6bw==&xVZpGL=6l3Df6RXzhnPD
                                                                                        O4FR7BTmYq.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • www.soundmoneymiles.com/cg86/
                                                                                        qUGJZ4Ih2v.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.tryscriptify.com/gy14/?Ylg8g4Ap=4JZiO/K9dKDZpUKGlDNe0/6pZOUW7vCSruOjW8aGne4X7Ok9IXpluEcnNjb2dUCVfwxE&Thct=Dxlpdbhpx
                                                                                        0jwySdaiGH.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.sendmeyourlink.com/g22y/?Ezut_=Qp/acSwkm5UwGz1M5ACYSDsWfOLyWpz+tctpPAdi++DWJOe8IseGDtcwc3XKDESsIHVq&mVuXCF=TxodfFN
                                                                                        a5hbkmGD7N.exeGet hashmaliciousPushdoBrowse
                                                                                        • touchfam.ca/
                                                                                        SOLICITUD DE OFERTA.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.chardonhouston.com/hi5f/?EPTX=1bGTxft0Kt5p-r4P&3fqLR=tGV7qkOfV0t3pqW61CwlYZmd6apjnAA0FtfCKbfjJNKCK3BUuQ0c0TkkRmHOwwQ9zYw1
                                                                                        qZSULDXKfu.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • www.patrickgtduo.com/c10s/?8pgX=gmubv2MwMOW0+YRyePFZeJBj7QgVjrif9PwQoQ3VJQP7WQz4VpOWtEAcgJWo1qowyTWI&9rkHLJ=oDKX3Rw
                                                                                        rSPAREPARTSLISTS.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • www.tryxcherry.com/cs10/?BTEdKzi=hMO0y5RjTieeesvNa3wBGwMpUHhma+bf8GU5MOmLpJokCV7hv561AC0GSBaqD0Su6C44&dZ=AlDXE
                                                                                        Confirm!!!!.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.emsculptcenterofne.com/he2a/?1bzTez0=nhNBuRkoNWOxJDiZ227X18Db1Kxbenb5b3vHQO2tFDH+XtD98Je8GVRwkFt4VPItbiYu&oH54=VT8lsXUPYHpTbNI
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        td-ccm-neg-87-45.wixdns.netSKM-56376258566FG.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 34.149.87.45
                                                                                        MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                        • 34.149.87.45
                                                                                        BBG76865646 PDF.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 34.149.87.45
                                                                                        rBancofiecompro.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 34.149.87.45
                                                                                        International Bank Transfer.exeGet hashmaliciousFormBookBrowse
                                                                                        • 34.149.87.45
                                                                                        rEncomendarPDF.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 34.149.87.45
                                                                                        Confirm PDF.exeGet hashmaliciousFormBookBrowse
                                                                                        • 34.149.87.45
                                                                                        Banka odeme havale makbuzu 20240213 TL950000900.exeGet hashmaliciousFormBookBrowse
                                                                                        • 34.149.87.45
                                                                                        rBCPcomprobante.exeGet hashmaliciousFormBookBrowse
                                                                                        • 34.149.87.45
                                                                                        Banka odeme havale makbuzu 20240209 TL950000900.exeGet hashmaliciousFormBookBrowse
                                                                                        • 34.149.87.45
                                                                                        www.baerana.comBanka odeme havale makbuzu 20240213 TL950000900.exeGet hashmaliciousFormBookBrowse
                                                                                        • 91.195.240.117
                                                                                        www.yassa-hany.onlineDocumento de confirmacion de orden de compra OC 1580070060.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.213
                                                                                        rBCPcomprobante.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.213
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        AARNET-AS-APAustralianAcademicandResearchNetworkAARNe8holJWXFZe.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                                                        • 103.168.172.221
                                                                                        U3jqFwE41l.elfGet hashmaliciousMiraiBrowse
                                                                                        • 157.85.242.197
                                                                                        NGiwZp340s.elfGet hashmaliciousMiraiBrowse
                                                                                        • 103.187.127.164
                                                                                        https://nzeoewqeyvwdtgfoj.sunrisetrading.com.bd/?userid=Ym9uZ2t5dS5jaHVuZ0BoeXVuZGFpZWxldmF0b3IuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 103.169.160.90
                                                                                        NwB5j32x4j.elfGet hashmaliciousMiraiBrowse
                                                                                        • 150.203.238.173
                                                                                        PO_No_0013011100.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                        • 103.186.117.232
                                                                                        Purchase_Order.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                        • 103.186.117.105
                                                                                        rIMG-Ponuda-Com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 103.183.115.241
                                                                                        SGpDkfehGu.elfGet hashmaliciousMiraiBrowse
                                                                                        • 103.182.79.16
                                                                                        Contracts1.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                        • 103.186.117.77
                                                                                        TRELLIAN-AS-APTrellianPtyLimitedAUREQ2024029.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 103.224.212.211
                                                                                        MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                        • 103.224.212.34
                                                                                        CERTIFICATE OF REGISTRY_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 103.224.212.216
                                                                                        VIMEKSIM PO# 1330 Confirmation_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 103.224.212.216
                                                                                        PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                                                                                        • 103.224.212.213
                                                                                        PaDQmSw2ud.dllGet hashmaliciousLaplas ClipperBrowse
                                                                                        • 103.224.212.213
                                                                                        jqPZZhDmjh.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.212
                                                                                        Documento de confirmacion de orden de compra OC 1580070060.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.213
                                                                                        2024-09C33T37.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.213
                                                                                        z2______________________________.exeGet hashmaliciousFormBookBrowse
                                                                                        • 103.224.212.212
                                                                                        SEDO-ASDEDHL Express_5047270226.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        DHL Receipt_2048094227.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        rN__089734.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 91.195.240.117
                                                                                        MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                        • 91.195.240.135
                                                                                        Modiolus.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 91.195.240.117
                                                                                        FedEx_AWB#53053752046.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        DHL_AWB# 5047292261.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        EJ9wbX3RFyX19aq.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.117
                                                                                        PO#2420009.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        DHL_AWB#6209011980.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                        • 91.195.240.19
                                                                                        TANDEMUShttps://gamma.app/docs/Mike-Han-AIT-Shared-Document-DocSpace-Online-n35yojamhwx320cGet hashmaliciousUnknownBrowse
                                                                                        • 15.197.213.252
                                                                                        https://midsoccnidnjkids-9393939.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                        • 15.197.193.217
                                                                                        MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                        • 15.197.204.56
                                                                                        speke.msiGet hashmaliciousUnknownBrowse
                                                                                        • 15.197.193.217
                                                                                        https://roblox.com.ag/login?returnUrl=0604171257863528Get hashmaliciousUnknownBrowse
                                                                                        • 15.197.130.221
                                                                                        https://fonts.goggleapis.comGet hashmaliciousUnknownBrowse
                                                                                        • 15.197.204.56
                                                                                        https://atthome-102382.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                        • 15.197.193.217
                                                                                        rl140Y9jeD.elfGet hashmaliciousMiraiBrowse
                                                                                        • 206.8.197.226
                                                                                        https://attttttttttoooo.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                        • 15.197.193.217
                                                                                        https://edjnakqkssnmjn.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                        • 15.197.193.217
                                                                                        No context
                                                                                        No context
                                                                                        Process:C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.34331486778365
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                        Malicious:false
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):1172
                                                                                        Entropy (8bit):5.357042452875322
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:3CytZWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9t7J0gt/NKIl9r6dj:yyjWSU4y4RQmFoUeWmfmZ9tK8NDE
                                                                                        MD5:475D428E7231D005EEA5DB556DBED03F
                                                                                        SHA1:3D603ED4280E0017D1BEB124D68183F8283B5C22
                                                                                        SHA-256:1314488A930843A7E1A003F2E7C1D883DB44ADEC26AC1CA096FE8DC1B4B180F5
                                                                                        SHA-512:7181BDCE6DA8DA8AFD3A973BB2B0BA470468EFF32FFB338DB2662FEFA1A7848ACD87C319706B95401EA18DC873CA098DC722EA6F8B2FD04F1AABD2AEBEA97CF9
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.914892866012158
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        File name:DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        File size:727'552 bytes
                                                                                        MD5:57c1720399fe09ae9cb92000d830260a
                                                                                        SHA1:5a9eccab9ebf649c94051ab9d2eaea47621ff3d6
                                                                                        SHA256:d9e11bf6dbbb2e9e75574f370b57e32efd4be3b1ba193b934933515aed9b933e
                                                                                        SHA512:4337ebb17161285beb5cb2a30883768e893331cc36b2380b63da1559ae83bdda56ce2c248ffa282dc83639f39c71425ff26487d772510c28b0d6c515d96db76d
                                                                                        SSDEEP:12288:Gsz42MZXW/3NIJhn9kMnv5/mbSegsEZ5U3nYpIetJFwuqQb6BtDX:5xMZG/32HnyMBm+eqZe3YPJhqy6nj
                                                                                        TLSH:47F4121572AC0D17D9FE6AFAB86072995BF6AA153407EBDC1DCD38EC82A1FC02505B43
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..............0......4........... ... ....@.. ....................................@................................
                                                                                        Icon Hash:36e198b4d066b842
                                                                                        Entrypoint:0x4b031a
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x65D4B975 [Tue Feb 20 14:38:45 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb02c80x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x3198.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000xae3200xae4006a8df8b243212350d60418207f0978e5False0.9301456577295553data7.9217768147100704IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xb20000x31980x3200c061139c206045469a787a62b37488c9False0.886171875data7.648485751480453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xb60000xc0x2007eb3447bcc9cda7b2483f69342ea9edfFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_ICON0xb21000x2b12PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9523852711772175
                                                                                        RT_GROUP_ICON0xb4c240x14data1.05
                                                                                        RT_VERSION0xb4c480x350data0.43514150943396224
                                                                                        RT_MANIFEST0xb4fa80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                        02/21/24-14:37:39.569984TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972280192.168.2.8103.224.212.213
                                                                                        02/21/24-14:38:01.164210TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.8103.167.199.20
                                                                                        02/21/24-14:34:54.459744TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971480192.168.2.83.33.130.190
                                                                                        02/21/24-14:37:19.115942TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972180192.168.2.891.195.240.117
                                                                                        02/21/24-14:35:55.287926TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972080192.168.2.815.197.142.173
                                                                                        02/21/24-14:35:13.479776TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971680192.168.2.834.149.87.45
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Feb 21, 2024 14:34:54.371778965 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.459481001 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:34:54.459618092 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.459743977 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.547384024 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:34:54.554198027 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:34:54.554219961 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:34:54.554347038 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.554434061 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.560785055 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:34:54.560849905 CET4971480192.168.2.83.33.130.190
                                                                                        Feb 21, 2024 14:34:54.642024040 CET80497143.33.130.190192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.388714075 CET4971680192.168.2.834.149.87.45
                                                                                        Feb 21, 2024 14:35:13.479553938 CET804971634.149.87.45192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.479629040 CET4971680192.168.2.834.149.87.45
                                                                                        Feb 21, 2024 14:35:13.479775906 CET4971680192.168.2.834.149.87.45
                                                                                        Feb 21, 2024 14:35:13.570463896 CET804971634.149.87.45192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.581985950 CET804971634.149.87.45192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.582040071 CET804971634.149.87.45192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.582123041 CET4971680192.168.2.834.149.87.45
                                                                                        Feb 21, 2024 14:35:13.582195997 CET4971680192.168.2.834.149.87.45
                                                                                        Feb 21, 2024 14:35:13.670469999 CET804971634.149.87.45192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.192200899 CET4972080192.168.2.815.197.142.173
                                                                                        Feb 21, 2024 14:35:55.287750006 CET804972015.197.142.173192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.287823915 CET4972080192.168.2.815.197.142.173
                                                                                        Feb 21, 2024 14:35:55.287925959 CET4972080192.168.2.815.197.142.173
                                                                                        Feb 21, 2024 14:35:55.382719994 CET804972015.197.142.173192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.383419037 CET804972015.197.142.173192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.383447886 CET804972015.197.142.173192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.383661985 CET4972080192.168.2.815.197.142.173
                                                                                        Feb 21, 2024 14:35:55.383755922 CET4972080192.168.2.815.197.142.173
                                                                                        Feb 21, 2024 14:35:55.478494883 CET804972015.197.142.173192.168.2.8
                                                                                        Feb 21, 2024 14:37:18.940747976 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.115699053 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.115844011 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.115942001 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.331018925 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354584932 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354609013 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354623079 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354641914 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354655027 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354686022 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354685068 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.354707956 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354749918 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.354749918 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.354759932 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354774952 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354799032 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.354834080 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.354870081 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.529478073 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529527903 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529576063 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.529583931 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529622078 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529659033 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529673100 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.529696941 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529733896 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529758930 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.529772997 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:19.529850006 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.529876947 CET4972180192.168.2.891.195.240.117
                                                                                        Feb 21, 2024 14:37:19.704480886 CET804972191.195.240.117192.168.2.8
                                                                                        Feb 21, 2024 14:37:39.413003922 CET4972280192.168.2.8103.224.212.213
                                                                                        Feb 21, 2024 14:37:39.569685936 CET8049722103.224.212.213192.168.2.8
                                                                                        Feb 21, 2024 14:37:39.569852114 CET4972280192.168.2.8103.224.212.213
                                                                                        Feb 21, 2024 14:37:39.569983959 CET4972280192.168.2.8103.224.212.213
                                                                                        Feb 21, 2024 14:37:39.763426065 CET8049722103.224.212.213192.168.2.8
                                                                                        Feb 21, 2024 14:37:39.763452053 CET8049722103.224.212.213192.168.2.8
                                                                                        Feb 21, 2024 14:37:39.763556004 CET4972280192.168.2.8103.224.212.213
                                                                                        Feb 21, 2024 14:37:39.763628006 CET4972280192.168.2.8103.224.212.213
                                                                                        Feb 21, 2024 14:37:39.920295954 CET8049722103.224.212.213192.168.2.8
                                                                                        Feb 21, 2024 14:38:00.807887077 CET4972380192.168.2.8103.167.199.20
                                                                                        Feb 21, 2024 14:38:01.163971901 CET8049723103.167.199.20192.168.2.8
                                                                                        Feb 21, 2024 14:38:01.164079905 CET4972380192.168.2.8103.167.199.20
                                                                                        Feb 21, 2024 14:38:01.164210081 CET4972380192.168.2.8103.167.199.20
                                                                                        Feb 21, 2024 14:38:01.519831896 CET8049723103.167.199.20192.168.2.8
                                                                                        Feb 21, 2024 14:38:01.520893097 CET8049723103.167.199.20192.168.2.8
                                                                                        Feb 21, 2024 14:38:01.520906925 CET8049723103.167.199.20192.168.2.8
                                                                                        Feb 21, 2024 14:38:01.520994902 CET4972380192.168.2.8103.167.199.20
                                                                                        Feb 21, 2024 14:38:01.521051884 CET4972380192.168.2.8103.167.199.20
                                                                                        Feb 21, 2024 14:38:01.876672029 CET8049723103.167.199.20192.168.2.8
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Feb 21, 2024 14:34:54.198509932 CET5949253192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:34:54.370790005 CET53594921.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:35:13.182126045 CET5569053192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:35:13.387804985 CET53556901.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:35:55.057487011 CET6503053192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:35:55.187500000 CET53650301.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:36:15.478955030 CET6025453192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:36:15.576605082 CET53602541.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:36:37.307163000 CET5230353192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:36:37.538652897 CET53523031.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:36:57.682596922 CET5329453192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:36:57.778846025 CET53532941.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:37:18.773803949 CET6010953192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:37:18.939240932 CET53601091.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:37:39.182940006 CET5151053192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:37:39.411945105 CET53515101.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:37:59.576106071 CET6254653192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:38:00.572196007 CET6254653192.168.2.81.1.1.1
                                                                                        Feb 21, 2024 14:38:00.806723118 CET53625461.1.1.1192.168.2.8
                                                                                        Feb 21, 2024 14:38:00.806783915 CET53625461.1.1.1192.168.2.8
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Feb 21, 2024 14:34:54.198509932 CET192.168.2.81.1.1.10x64f0Standard query (0)www.rdlva.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:13.182126045 CET192.168.2.81.1.1.10x9d1bStandard query (0)www.ae-skinlab.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:55.057487011 CET192.168.2.81.1.1.10xb89aStandard query (0)www.quickfibrokers.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:15.478955030 CET192.168.2.81.1.1.10x6230Standard query (0)www.permanentday.spaceA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:37.307163000 CET192.168.2.81.1.1.10x4b3aStandard query (0)www.usetruerreview.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:57.682596922 CET192.168.2.81.1.1.10x7aceStandard query (0)www.bigtexture.xyzA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:37:18.773803949 CET192.168.2.81.1.1.10xb44cStandard query (0)www.baerana.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:37:39.182940006 CET192.168.2.81.1.1.10x42dcStandard query (0)www.yassa-hany.onlineA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:37:59.576106071 CET192.168.2.81.1.1.10x59a5Standard query (0)www.taxibactrungnam.comA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:38:00.572196007 CET192.168.2.81.1.1.10x59a5Standard query (0)www.taxibactrungnam.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Feb 21, 2024 14:34:54.370790005 CET1.1.1.1192.168.2.80x64f0No error (0)www.rdlva.comrdlva.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:34:54.370790005 CET1.1.1.1192.168.2.80x64f0No error (0)rdlva.com3.33.130.190A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:34:54.370790005 CET1.1.1.1192.168.2.80x64f0No error (0)rdlva.com15.197.148.33A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:13.387804985 CET1.1.1.1192.168.2.80x9d1bNo error (0)www.ae-skinlab.comcdn1.wixdns.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:13.387804985 CET1.1.1.1192.168.2.80x9d1bNo error (0)cdn1.wixdns.nettd-ccm-neg-87-45.wixdns.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:13.387804985 CET1.1.1.1192.168.2.80x9d1bNo error (0)td-ccm-neg-87-45.wixdns.net34.149.87.45A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:55.187500000 CET1.1.1.1192.168.2.80xb89aNo error (0)www.quickfibrokers.comquickfibrokers.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:55.187500000 CET1.1.1.1192.168.2.80xb89aNo error (0)quickfibrokers.com15.197.142.173A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:35:55.187500000 CET1.1.1.1192.168.2.80xb89aNo error (0)quickfibrokers.com3.33.152.147A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:15.576605082 CET1.1.1.1192.168.2.80x6230Name error (3)www.permanentday.spacenonenoneA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:37.538652897 CET1.1.1.1192.168.2.80x4b3aName error (3)www.usetruerreview.comnonenoneA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:36:57.778846025 CET1.1.1.1192.168.2.80x7aceName error (3)www.bigtexture.xyznonenoneA (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:37:18.939240932 CET1.1.1.1192.168.2.80xb44cNo error (0)www.baerana.com91.195.240.117A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:37:39.411945105 CET1.1.1.1192.168.2.80x42dcNo error (0)www.yassa-hany.online103.224.212.213A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:38:00.806723118 CET1.1.1.1192.168.2.80x59a5No error (0)www.taxibactrungnam.comtaxibactrungnam.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:38:00.806723118 CET1.1.1.1192.168.2.80x59a5No error (0)taxibactrungnam.com103.167.199.20A (IP address)IN (0x0001)false
                                                                                        Feb 21, 2024 14:38:00.806783915 CET1.1.1.1192.168.2.80x59a5No error (0)www.taxibactrungnam.comtaxibactrungnam.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Feb 21, 2024 14:38:00.806783915 CET1.1.1.1192.168.2.80x59a5No error (0)taxibactrungnam.com103.167.199.20A (IP address)IN (0x0001)false
                                                                                        • www.rdlva.com
                                                                                        • www.ae-skinlab.com
                                                                                        • www.quickfibrokers.com
                                                                                        • www.baerana.com
                                                                                        • www.yassa-hany.online
                                                                                        • www.taxibactrungnam.com
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.8497143.33.130.190804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:34:54.459743977 CET163OUTGET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+ HTTP/1.1
                                                                                        Host: www.rdlva.com
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:34:54.554198027 CET306INHTTP/1.1 301 Moved Permanently
                                                                                        Server: openresty
                                                                                        Date: Wed, 21 Feb 2024 13:34:54 GMT
                                                                                        Content-Type: text/plain
                                                                                        Content-Length: 0
                                                                                        Connection: close
                                                                                        Location: https://www.rdlva.com/pz08/?N6Ahw=3ffl2F0Punah42&Ap=sHUCYmOOLAoNE4y8/5cjc5MBwdY8WEAoN/4wEGeHNPnX/dfJjUbL6GitjMlkSkRNL9P+
                                                                                        ETag: "65d0dd59-0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.84971634.149.87.45804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:35:13.479775906 CET168OUTGET /pz08/?Ap=2oeA2CX1Q61jX45FJrFMqJgZRjY3h4s6VR+9nrWXkdAg0YO+UupxHOYJVxDLCxYuKaEo&N6Ahw=3ffl2F0Punah42 HTTP/1.1
                                                                                        Host: www.ae-skinlab.com
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:35:13.581985950 CET346INHTTP/1.1 429 Too Many Requests
                                                                                        Content-Length: 0
                                                                                        Accept-Ranges: bytes
                                                                                        Date: Wed, 21 Feb 2024 13:35:13 GMT
                                                                                        X-Served-By: cache-iad-kjyo7100142-IAD
                                                                                        X-Cache: MISS
                                                                                        X-Seen-By: yvSunuo/8ld62ehjr5B7kA==,VtqAe8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=
                                                                                        Via: 1.1 google
                                                                                        glb-x-seen-by: bS8wRlGzu0Hc+WrYuHB8QIg44yfcdCMJRkBoQ1h6Vjc=
                                                                                        Connection: close


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.84972015.197.142.173804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:35:55.287925959 CET172OUTGET /pz08/?Ap=FGzpPczua9V5Fhp0KyeSYZEXQ8ThSiWTqmgy8xu2EJQTOQiKwoJBowNtdQHJGs6scj9G&N6Ahw=3ffl2F0Punah42 HTTP/1.1
                                                                                        Host: www.quickfibrokers.com
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:35:55.383419037 CET266INHTTP/1.1 403 Forbidden
                                                                                        Server: awselb/2.0
                                                                                        Date: Wed, 21 Feb 2024 13:35:55 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 118
                                                                                        Connection: close
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center></body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.84972191.195.240.117804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:37:19.115942001 CET165OUTGET /pz08/?Ap=iUtqEraofiOoamAGmz9y1BZqdP67NXRhW/u/s4hsis3XwB7pF+A9OlO8MXjIW5A/mozx&N6Ahw=3ffl2F0Punah42 HTTP/1.1
                                                                                        Host: www.baerana.com
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:37:19.354584932 CET1286INHTTP/1.1 200 OK
                                                                                        date: Wed, 21 Feb 2024 13:37:19 GMT
                                                                                        content-type: text/html; charset=UTF-8
                                                                                        transfer-encoding: chunked
                                                                                        vary: Accept-Encoding
                                                                                        x-powered-by: PHP/8.1.17
                                                                                        expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                        cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                        pragma: no-cache
                                                                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_Z/ryV7VBcR+45hF4Cw+bbaGCUaB0IIRd6Xz1jmAC7fWm+mByxrf168+4qnwOuVjfrGTsAdcGEp5pk5Sya6TVSg==
                                                                                        last-modified: Wed, 21 Feb 2024 13:37:19 GMT
                                                                                        x-cache-miss-from: parking-6db66cd898-zpcjt
                                                                                        server: NginX
                                                                                        connection: close
                                                                                        Data Raw: 32 45 45 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 5a 2f 72 79 56 37 56 42 63 52 2b 34 35 68 46 34 43 77 2b 62 62 61 47 43 55 61 42 30 49 49 52 64 36 58 7a 31 6a 6d 41 43 37 66 57 6d 2b 6d 42 79 78 72 66 31 36 38 2b 34 71 6e 77 4f 75 56 6a 66 72 47 54 73 41 64 63 47 45 70 35 70 6b 35 53 79 61 36 54 56 53 67 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 62 61 65 72 61 6e 61 2e 63 6f 6d 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 62 61 65 72 61 6e 61 20 52 65 73 6f 75 72 63 65 73 20 61 6e 64 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 2e 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 62 61 65 72 61 6e 61 2e 63 6f 6d 20 69 73 20 79 6f 75 72 20 66 69 72 73 74 20 61 6e 64 20 62 65 73 74 20 73 6f 75 72 63 65 20 66 6f 72 20 61 6c 6c 20 6f 66 20 74 68 65 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 79 6f 75 e2 80 99 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 20 46 72 6f 6d 20 67 65 6e 65 72 61 6c 20 74 6f 70 69
                                                                                        Data Ascii: 2EE<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_Z/ryV7VBcR+45hF4Cw+bbaGCUaB0IIRd6Xz1jmAC7fWm+mByxrf168+4qnwOuVjfrGTsAdcGEp5pk5Sya6TVSg==><head><meta charset="utf-8"><title>baerana.com&nbsp;-&nbsp;baerana Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="baerana.com is your first and best source for all of the information youre looking for. From general topi
                                                                                        Feb 21, 2024 14:37:19.354609013 CET1286INData Raw: 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79 6f 75 20 77 6f 75 6c 64 20 65 78 70 65 63 74 20 74 6f 20 66 69 6e 64 20 68 65 72 65 2c 20 62 61 65 72 61 6e 61 2e 63 6f 6d 20 68 61 73 20 69 74 20 61 6c 6c 2e 20 57 65 20 68 6f 70 65 20
                                                                                        Data Ascii: cs to more of what you would expect to find here, baerana.com has it all. We hope you find what you are searching for!"><link rel=570"icon" type="image/png" href="//img.sedoparking.com/templates/logos/sedo_logo.png"
                                                                                        Feb 21, 2024 14:37:19.354623079 CET1286INData Raw: 62 7b 62 6f 74 74 6f 6d 3a 2d 30 2e 32 35 65 6d 7d 73 75 70 7b 74 6f 70 3a 2d 30 2e 35 65 6d 7d 61 75 64 69 6f 2c 76 69 64 65 6f 7b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 7d 61 75 64 69 6f 3a 6e 6f 74 28 5b 63 6f 6e 74 72 6f
                                                                                        Data Ascii: b{bottom:-0.25em}sup{top:-0.5em}audio,video{display:inline-block}audio:not([controls]){display:none;height:0}img{border-style:none}svg:not(:root){overflow:hidden}button,input,optgroup,select,textarea{font-family:sans-serif;font-size:100%;line-
                                                                                        Feb 21, 2024 14:37:19.354641914 CET1286INData Raw: 63 65 3a 62 75 74 74 6f 6e 3b 66 6f 6e 74 3a 69 6e 68 65 72 69 74 7d 64 65 74 61 69 6c 73 2c 6d 65 6e 75 7b 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 7d 73 75 6d 6d 61 72 79 7b 64 69 73 70 6c 61 79 3a 6c 69 73 74 2d 69 74 65 6d 7d 63 61 6e 76 61 73
                                                                                        Data Ascii: ce:button;font:inherit}details,menu{display:block}summary{display:list-item}canvas{display:inline-block}template{display:none}[hidden]{display:none}.announcement{background:#313131;text-align:center;padding:0 5px}.announcement p{color:#848484}
                                                                                        Feb 21, 2024 14:37:19.354655027 CET1286INData Raw: 2d 62 6c 6f 63 6b 7d 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 69 6d 61 67 65 7b 63 6f 6e 74 65 6e 74 3a 75 72 6c 28 22 2f 2f 69 6d 67 2e 73 65 64 6f 70 61 72 6b 69 6e 67 2e 63 6f 6d 2f 74
                                                                                        Data Ascii: -block}.two-tier-ads-list__list-element-image{content:url("//img.sedoparking.com/templates/images/bullet_justads.gif");float:left;padding-top:32px}.two-tier-ads-list__list-element-content{display:inline-block}.two-tier-ads-list__list-element-h
                                                                                        Feb 21, 2024 14:37:19.354686022 CET1286INData Raw: 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 66 6f 63 75 73 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 75 6e 64 65 72 6c 69 6e 65 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 62 75 79 62 6f 78 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65
                                                                                        Data Ascii: st-element-link:focus{text-decoration:underline}.container-buybox{text-align:center}.container-buybox__content-buybox{display:inline-block;text-align:left}.container-buybox__content-heading{font-size:15px}.container-buybox__content-text{font-s
                                                                                        Feb 21, 2024 14:37:19.354707956 CET1286INData Raw: 6f 63 6b 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 61 63 74 2d 75 73 5f 5f 63 6f 6e 74 65 6e 74 2d 74 65 78 74 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 61 63 74 2d 75 73 5f 5f 63 6f 6e 74 65 6e 74 2d 6c 69 6e 6b 7b 66 6f 6e 74 2d 73
                                                                                        Data Ascii: ock}.container-contact-us__content-text,.container-contact-us__content-link{font-size:10px;color:#949494}.container-privacyPolicy{text-align:center}.container-privacyPolicy__content{display:inline-block}.container-privacyPolicy__content-link{f
                                                                                        Feb 21, 2024 14:37:19.354759932 CET1286INData Raw: 74 69 61 6c 3b 6d 61 72 67 69 6e 3a 31 30 25 20 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 34 30 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 66 66 66 3b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 3b 6d 61 78 2d 77 69 64 74 68 3a 35
                                                                                        Data Ascii: tial;margin:10% auto;padding:40px;background:#fff;display:inline-block;max-width:550px}.cookie-modal-window__content-text{line-height:1.5em}.cookie-modal-window__close{width:100%;margin:0}.cookie-modal-window__content-body table{width:100%;bor
                                                                                        Feb 21, 2024 14:37:19.354774952 CET1286INData Raw: 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 37 32 37 63 38 33 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 37 32 37 63 38 33 3b 63 6f 6c 6f 72 3a 23 66 66 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 69 6e 69 74 69 61 6c 7d 2e 73 77 69 74 63 68 20 69 6e 70 75 74
                                                                                        Data Ascii: ound-color:#727c83;border-color:#727c83;color:#fff;font-size:initial}.switch input{opacity:0;width:0;height:0}.switch{position:relative;display:inline-block;width:60px;height:34px}.switch__slider{position:absolute;cursor:pointer;top:0;left:0;r
                                                                                        Feb 21, 2024 14:37:19.354834080 CET1052INData Raw: 6f 53 65 6c 6c 22 3a 66 61 6c 73 65 2c 22 63 64 6e 48 6f 73 74 22 3a 22 68 74 74 70 3a 2f 2f 69 6d 67 2e 73 65 64 6f 70 61 72 6b 69 6e 67 2e 63 6f 6d 22 2c 22 61 64 62 6c 6f 63 6b 6b 65 79 22 3a 22 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79
                                                                                        Data Ascii: oSell":false,"cdnHost":"http://img.sedoparking.com","adblockkey":" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_Z/ryV7VBcR+45hF4Cw+bbaGCUaB0IIR
                                                                                        Feb 21, 2024 14:37:19.529478073 CET1286INData Raw: 31 43 34 0d 0a 2c 22 74 6f 6b 65 6e 22 3a 7b 22 70 61 67 65 4c 6f 61 64 65 64 22 3a 22 61 30 65 65 39 39 35 35 62 64 63 35 61 37 33 33 30 31 37 30 38 35 32 32 36 33 39 35 33 62 31 38 31 61 63 38 33 38 63 39 66 64 22 7d 7d 2c 22 67 46 65 65 64 53
                                                                                        Data Ascii: 1C4,"token":{"pageLoaded":"a0ee9955bdc5a7330170852263953b181ac838c9fd"}},"gFeedSES":{"default":"OAkwZGRmNmFhZGIyYjNlODU2YWQ1ZjY3ZWIwNzI5ZTU4ZgkxMjAxCTEzCTAJCTU2OTkzOTYxMQliYWVyYW5hCTMwNjUJMQk1CTU5CTE3MDg1MjI2MzkJMAlOCTAJMAkwCTEyMDUJNTU4NzQ2N


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.849722103.224.212.213804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:37:39.569983959 CET171OUTGET /pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiR HTTP/1.1
                                                                                        Host: www.yassa-hany.online
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:37:39.763426065 CET435INHTTP/1.1 302 Found
                                                                                        date: Wed, 21 Feb 2024 13:37:39 GMT
                                                                                        server: Apache
                                                                                        set-cookie: __tad=1708522659.3408500; expires=Sat, 18-Feb-2034 13:37:39 GMT; Max-Age=315360000
                                                                                        location: http://ww25.yassa-hany.online/pz08/?N6Ahw=3ffl2F0Punah42&Ap=QdC7EAnI8ZBK6KsnIEDwiNoe1wSidTgePl3trAKN/Agbi7tcJn0SHRDVuP1PGrx4qdiR&subid1=20240222-0037-39f7-b636-081468e26bcd
                                                                                        content-length: 2
                                                                                        content-type: text/html; charset=UTF-8
                                                                                        connection: close
                                                                                        Data Raw: 0a 0a
                                                                                        Data Ascii:


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.849723103.167.199.20804084C:\Windows\explorer.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Feb 21, 2024 14:38:01.164210081 CET173OUTGET /pz08/?Ap=bKUMdxsXbZ20XGxWaFGGS8S5qdUvksLLWvMweKpTgT2MARQxqrmnXGgSr/TayxAxMgg2&N6Ahw=3ffl2F0Punah42 HTTP/1.1
                                                                                        Host: www.taxibactrungnam.com
                                                                                        Connection: close
                                                                                        Data Raw: 00 00 00 00 00 00 00
                                                                                        Data Ascii:
                                                                                        Feb 21, 2024 14:38:01.520893097 CET304INHTTP/1.1 404 Not Found
                                                                                        Server: nginx
                                                                                        Date: Wed, 21 Feb 2024 13:38:01 GMT
                                                                                        Content-Type: text/html; charset=utf-8
                                                                                        Content-Length: 146
                                                                                        Connection: close
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                                        Code Manipulations

                                                                                        Function NameHook TypeActive in Processes
                                                                                        PeekMessageAINLINEexplorer.exe
                                                                                        PeekMessageWINLINEexplorer.exe
                                                                                        GetMessageWINLINEexplorer.exe
                                                                                        GetMessageAINLINEexplorer.exe
                                                                                        Function NameHook TypeNew Data
                                                                                        PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEA
                                                                                        PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEA
                                                                                        GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEA
                                                                                        GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEA

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:14:34:06
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Imagebase:0x540000
                                                                                        File size:727'552 bytes
                                                                                        MD5 hash:57C1720399FE09AE9CB92000D830260A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1469792389.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1473298429.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1473432091.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1467009069.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.1469792389.0000000003BF8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1467009069.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:14:34:11
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Imagebase:0xda0000
                                                                                        File size:433'152 bytes
                                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:14:34:12
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6ee680000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:14:34:12
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe
                                                                                        Imagebase:0xea0000
                                                                                        File size:727'552 bytes
                                                                                        MD5 hash:57C1720399FE09AE9CB92000D830260A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:14:34:12
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\explorer.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\Explorer.EXE
                                                                                        Imagebase:0x7ff62d7d0000
                                                                                        File size:5'141'208 bytes
                                                                                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000006.00000002.3899090558.000000000E089000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:7
                                                                                        Start time:14:34:15
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\SysWOW64\systray.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\systray.exe
                                                                                        Imagebase:0xb0000
                                                                                        File size:9'728 bytes
                                                                                        MD5 hash:28D565BB24D30E5E3DE8AFF6900AF098
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3884970564.0000000004A20000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3884563234.0000000002F70000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:moderate
                                                                                        Has exited:false

                                                                                        Target ID:8
                                                                                        Start time:14:34:19
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:/c del "C:\Users\user\Desktop\DHL Factura Electronica Pendiente documento No 04BB25083.exe"
                                                                                        Imagebase:0xa40000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:9
                                                                                        Start time:14:34:19
                                                                                        Start date:21/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6ee680000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:11.4%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:266
                                                                                          Total number of Limit Nodes:24
                                                                                          execution_graph 20108 70045a0 20109 700472b 20108->20109 20111 70045c6 20108->20111 20111->20109 20112 7002b20 20111->20112 20113 7004820 PostMessageW 20112->20113 20114 700488c 20113->20114 20114->20111 19841 70020c1 19843 7002071 19841->19843 19842 7002080 19843->19842 19851 7003466 19843->19851 19869 70033f8 19843->19869 19886 70033c8 19843->19886 19903 70033b8 19843->19903 19920 7003378 19843->19920 19938 7003338 19843->19938 19957 7003408 19843->19957 19852 70033f4 19851->19852 19854 7003469 19851->19854 19974 70038a7 19852->19974 19979 700391f 19852->19979 19983 7003ada 19852->19983 19991 7003c58 19852->19991 19999 7003e37 19852->19999 20004 70040f5 19852->20004 20008 7003d94 19852->20008 20015 7003913 19852->20015 20020 7003a71 19852->20020 20025 7003ed1 19852->20025 20032 7003990 19852->20032 20036 7003eb0 19852->20036 20041 7003c0d 19852->20041 20046 7003d69 19852->20046 19853 7003446 19853->19842 19854->19842 19870 7003402 19869->19870 19872 70038a7 2 API calls 19870->19872 19873 7003d69 2 API calls 19870->19873 19874 7003c0d 2 API calls 19870->19874 19875 7003eb0 2 API calls 19870->19875 19876 7003990 2 API calls 19870->19876 19877 7003ed1 2 API calls 19870->19877 19878 7003a71 2 API calls 19870->19878 19879 7003913 2 API calls 19870->19879 19880 7003d94 4 API calls 19870->19880 19881 70040f5 2 API calls 19870->19881 19882 7003e37 2 API calls 19870->19882 19883 7003c58 4 API calls 19870->19883 19884 7003ada 4 API calls 19870->19884 19885 700391f ResumeThread 19870->19885 19871 7003446 19871->19842 19872->19871 19873->19871 19874->19871 19875->19871 19876->19871 19877->19871 19878->19871 19879->19871 19880->19871 19881->19871 19882->19871 19883->19871 19884->19871 19885->19871 19887 70033da 19886->19887 19887->19842 19889 70038a7 2 API calls 19887->19889 19890 7003d69 2 API calls 19887->19890 19891 7003c0d 2 API calls 19887->19891 19892 7003eb0 2 API calls 19887->19892 19893 7003990 2 API calls 19887->19893 19894 7003ed1 2 API calls 19887->19894 19895 7003a71 2 API calls 19887->19895 19896 7003913 2 API calls 19887->19896 19897 7003d94 4 API calls 19887->19897 19898 70040f5 2 API calls 19887->19898 19899 7003e37 2 API calls 19887->19899 19900 7003c58 4 API calls 19887->19900 19901 7003ada 4 API calls 19887->19901 19902 700391f ResumeThread 19887->19902 19888 7003446 19888->19842 19889->19888 19890->19888 19891->19888 19892->19888 19893->19888 19894->19888 19895->19888 19896->19888 19897->19888 19898->19888 19899->19888 19900->19888 19901->19888 19902->19888 19904 70033c7 19903->19904 19904->19842 19906 70038a7 2 API calls 19904->19906 19907 7003d69 2 API calls 19904->19907 19908 7003c0d 2 API calls 19904->19908 19909 7003eb0 2 API calls 19904->19909 19910 7003990 2 API calls 19904->19910 19911 7003ed1 2 API calls 19904->19911 19912 7003a71 2 API calls 19904->19912 19913 7003913 2 API calls 19904->19913 19914 7003d94 4 API calls 19904->19914 19915 70040f5 2 API calls 19904->19915 19916 7003e37 2 API calls 19904->19916 19917 7003c58 4 API calls 19904->19917 19918 7003ada 4 API calls 19904->19918 19919 700391f ResumeThread 19904->19919 19905 7003446 19905->19842 19906->19905 19907->19905 19908->19905 19909->19905 19910->19905 19911->19905 19912->19905 19913->19905 19914->19905 19915->19905 19916->19905 19917->19905 19918->19905 19919->19905 19920->19920 19922 7003382 19920->19922 19921 7003387 19921->19842 19922->19842 19922->19921 19924 70038a7 2 API calls 19922->19924 19925 7003d69 2 API calls 19922->19925 19926 7003c0d 2 API calls 19922->19926 19927 7003eb0 2 API calls 19922->19927 19928 7003990 2 API calls 19922->19928 19929 7003ed1 2 API calls 19922->19929 19930 7003a71 2 API calls 19922->19930 19931 7003913 2 API calls 19922->19931 19932 7003d94 4 API calls 19922->19932 19933 70040f5 2 API calls 19922->19933 19934 7003e37 2 API calls 19922->19934 19935 7003c58 4 API calls 19922->19935 19936 7003ada 4 API calls 19922->19936 19937 700391f ResumeThread 19922->19937 19923 7003446 19923->19842 19924->19923 19925->19923 19926->19923 19927->19923 19928->19923 19929->19923 19930->19923 19931->19923 19932->19923 19933->19923 19934->19923 19935->19923 19936->19923 19937->19923 19939 7003347 19938->19939 19941 7003382 19938->19941 19939->19842 19940 7003387 19940->19842 19941->19842 19941->19940 19943 70038a7 2 API calls 19941->19943 19944 7003d69 2 API calls 19941->19944 19945 7003c0d 2 API calls 19941->19945 19946 7003eb0 2 API calls 19941->19946 19947 7003990 2 API calls 19941->19947 19948 7003ed1 2 API calls 19941->19948 19949 7003a71 2 API calls 19941->19949 19950 7003913 2 API calls 19941->19950 19951 7003d94 4 API calls 19941->19951 19952 70040f5 2 API calls 19941->19952 19953 7003e37 2 API calls 19941->19953 19954 7003c58 4 API calls 19941->19954 19955 7003ada 4 API calls 19941->19955 19956 700391f ResumeThread 19941->19956 19942 7003446 19942->19842 19943->19942 19944->19942 19945->19942 19946->19942 19947->19942 19948->19942 19949->19942 19950->19942 19951->19942 19952->19942 19953->19942 19954->19942 19955->19942 19956->19942 19958 7003422 19957->19958 19960 70038a7 2 API calls 19958->19960 19961 7003d69 2 API calls 19958->19961 19962 7003c0d 2 API calls 19958->19962 19963 7003eb0 2 API calls 19958->19963 19964 7003990 2 API calls 19958->19964 19965 7003ed1 2 API calls 19958->19965 19966 7003a71 2 API calls 19958->19966 19967 7003913 2 API calls 19958->19967 19968 7003d94 4 API calls 19958->19968 19969 70040f5 2 API calls 19958->19969 19970 7003e37 2 API calls 19958->19970 19971 7003c58 4 API calls 19958->19971 19972 7003ada 4 API calls 19958->19972 19973 700391f ResumeThread 19958->19973 19959 7003446 19959->19842 19960->19959 19961->19959 19962->19959 19963->19959 19964->19959 19965->19959 19966->19959 19967->19959 19968->19959 19969->19959 19970->19959 19971->19959 19972->19959 19973->19959 19975 70038ad 19974->19975 20051 7001c60 19975->20051 20055 7001c54 19975->20055 19980 7003944 19979->19980 20059 7001358 19980->20059 19984 7003afd 19983->19984 20072 70019d0 19984->20072 20076 70019d8 19984->20076 19985 700391b 19985->19853 19986 7003909 19986->19985 20063 7001400 19986->20063 20068 7001408 19986->20068 19992 7003d9d 19991->19992 19994 7003909 19992->19994 20080 7001ac0 19992->20080 20084 7001ac8 19992->20084 19993 700391b 19993->19853 19994->19993 19997 7001400 Wow64SetThreadContext 19994->19997 19998 7001408 Wow64SetThreadContext 19994->19998 19997->19994 19998->19994 20002 7001400 Wow64SetThreadContext 19999->20002 20003 7001408 Wow64SetThreadContext 19999->20003 20000 7003909 20000->19999 20001 700391b 20000->20001 20001->19853 20002->20000 20003->20000 20088 7001910 20004->20088 20092 7001918 20004->20092 20005 700404e 20005->20004 20011 7001ac0 ReadProcessMemory 20008->20011 20012 7001ac8 ReadProcessMemory 20008->20012 20009 7003909 20010 700391b 20009->20010 20013 7001400 Wow64SetThreadContext 20009->20013 20014 7001408 Wow64SetThreadContext 20009->20014 20010->19853 20011->20009 20012->20009 20013->20009 20014->20009 20016 7003909 20015->20016 20017 700391b 20016->20017 20018 7001400 Wow64SetThreadContext 20016->20018 20019 7001408 Wow64SetThreadContext 20016->20019 20017->19853 20018->20016 20019->20016 20021 7003a9a 20020->20021 20023 70019d0 WriteProcessMemory 20021->20023 20024 70019d8 WriteProcessMemory 20021->20024 20022 7003abb 20022->19853 20023->20022 20024->20022 20030 70019d0 WriteProcessMemory 20025->20030 20031 70019d8 WriteProcessMemory 20025->20031 20026 70041f5 20027 7003bd9 20027->20026 20028 70019d0 WriteProcessMemory 20027->20028 20029 70019d8 WriteProcessMemory 20027->20029 20028->20027 20029->20027 20030->20027 20031->20027 20034 7001400 Wow64SetThreadContext 20032->20034 20035 7001408 Wow64SetThreadContext 20032->20035 20033 70039b3 20033->19853 20034->20033 20035->20033 20037 7003909 20036->20037 20037->20036 20038 700391b 20037->20038 20039 7001400 Wow64SetThreadContext 20037->20039 20040 7001408 Wow64SetThreadContext 20037->20040 20038->19853 20039->20037 20040->20037 20042 7003a9a 20041->20042 20043 7003abb 20041->20043 20044 70019d0 WriteProcessMemory 20042->20044 20045 70019d8 WriteProcessMemory 20042->20045 20043->19853 20044->20043 20045->20043 20047 7003bd9 20046->20047 20047->20046 20048 70041f5 20047->20048 20049 70019d0 WriteProcessMemory 20047->20049 20050 70019d8 WriteProcessMemory 20047->20050 20049->20047 20050->20047 20052 7001ce9 CreateProcessA 20051->20052 20054 7001eab 20052->20054 20056 7001ce9 CreateProcessA 20055->20056 20058 7001eab 20056->20058 20060 7001398 ResumeThread 20059->20060 20062 70013c9 20060->20062 20064 70013f0 20063->20064 20065 7001406 Wow64SetThreadContext 20063->20065 20064->19986 20067 7001495 20065->20067 20067->19986 20069 700144d Wow64SetThreadContext 20068->20069 20071 7001495 20069->20071 20071->19986 20073 7001a20 WriteProcessMemory 20072->20073 20075 7001a77 20073->20075 20075->19986 20077 7001a20 WriteProcessMemory 20076->20077 20079 7001a77 20077->20079 20079->19986 20081 7001b13 ReadProcessMemory 20080->20081 20083 7001b57 20081->20083 20083->19994 20085 7001b13 ReadProcessMemory 20084->20085 20087 7001b57 20085->20087 20087->19994 20089 7001958 VirtualAllocEx 20088->20089 20091 7001995 20089->20091 20091->20005 20093 7001958 VirtualAllocEx 20092->20093 20095 7001995 20093->20095 20095->20005 20096 c2d380 20097 c2d3c6 GetCurrentProcess 20096->20097 20099 c2d411 20097->20099 20100 c2d418 GetCurrentThread 20097->20100 20099->20100 20101 c2d455 GetCurrentProcess 20100->20101 20102 c2d44e 20100->20102 20103 c2d48b GetCurrentThreadId 20101->20103 20102->20101 20105 c2d4e4 20103->20105 20106 c2d5c8 DuplicateHandle 20107 c2d65e 20106->20107 20115 c24668 20116 c24672 20115->20116 20118 c24759 20115->20118 20119 c2477d 20118->20119 20123 c24857 20119->20123 20127 c24868 20119->20127 20125 c2488f 20123->20125 20124 c2496c 20124->20124 20125->20124 20131 c23e44 20125->20131 20128 c2488f 20127->20128 20129 c2496c 20128->20129 20130 c23e44 CreateActCtxA 20128->20130 20130->20129 20132 c25cf8 CreateActCtxA 20131->20132 20134 c25dbb 20132->20134 20135 c2aff8 20139 c2b0e0 20135->20139 20147 c2b0f0 20135->20147 20136 c2b007 20140 c2b101 20139->20140 20141 c2b124 20139->20141 20140->20141 20155 c2b388 20140->20155 20159 c2b379 20140->20159 20141->20136 20142 c2b11c 20142->20141 20143 c2b328 GetModuleHandleW 20142->20143 20144 c2b355 20143->20144 20144->20136 20148 c2b101 20147->20148 20149 c2b124 20147->20149 20148->20149 20153 c2b388 LoadLibraryExW 20148->20153 20154 c2b379 LoadLibraryExW 20148->20154 20149->20136 20150 c2b11c 20150->20149 20151 c2b328 GetModuleHandleW 20150->20151 20152 c2b355 20151->20152 20152->20136 20153->20150 20154->20150 20156 c2b39c 20155->20156 20158 c2b3c1 20156->20158 20163 c2adb8 20156->20163 20158->20142 20160 c2b39c 20159->20160 20161 c2adb8 LoadLibraryExW 20160->20161 20162 c2b3c1 20160->20162 20161->20162 20162->20142 20164 c2b568 LoadLibraryExW 20163->20164 20166 c2b5e1 20164->20166 20166->20158
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 83f0526f5f6d8857c34d6a55fb1f771df8633064b0e99777c969c645e896f19e
                                                                                          • Instruction ID: f2440dc9b56d2245740974871262720b4f8433dce25d90897a66f3bb4124bf11
                                                                                          • Opcode Fuzzy Hash: 83f0526f5f6d8857c34d6a55fb1f771df8633064b0e99777c969c645e896f19e
                                                                                          • Instruction Fuzzy Hash: 23B2C075E01228CFDB64CF69C984AD9BBB2FF89304F1581E9D509AB225DB319E81CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4d853fec64b751ede945f7694b97dee6e25813f12086297a0f64b574261604a7
                                                                                          • Instruction ID: 4a9ae638a095644f349ab5b5b7c8d35c62387b70a2dd16b8c4a09a0e37934f3f
                                                                                          • Opcode Fuzzy Hash: 4d853fec64b751ede945f7694b97dee6e25813f12086297a0f64b574261604a7
                                                                                          • Instruction Fuzzy Hash: 5F61C874D09318CFEB54CFA6C8406FDBBB6BF89340F11A429D819AB255DB345A85CF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bb90a192eefd7d328e803a0d023ddb4a11b3baa0c1a77402f3ab91ff9779c991
                                                                                          • Instruction ID: 98aa46dfb531d5a7392c89a0e5fd855dc892254197c1117fa963dbcd087a3a2e
                                                                                          • Opcode Fuzzy Hash: bb90a192eefd7d328e803a0d023ddb4a11b3baa0c1a77402f3ab91ff9779c991
                                                                                          • Instruction Fuzzy Hash: 6D612B70E042099FEB08EFBAF85169E7BF2FBC8700F14C569E0089B259EF7519069B51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 00C2D3FE
                                                                                          • GetCurrentThread.KERNEL32 ref: 00C2D43B
                                                                                          • GetCurrentProcess.KERNEL32 ref: 00C2D478
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00C2D4D1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: 47ff71e1ebb9689675a1af342a7ebec9732976e0d8964028fa549bd1f4082af9
                                                                                          • Instruction ID: 769225446cd5c917538578ce5059d8374b99af9ff56c4556841b17085c3072b2
                                                                                          • Opcode Fuzzy Hash: 47ff71e1ebb9689675a1af342a7ebec9732976e0d8964028fa549bd1f4082af9
                                                                                          • Instruction Fuzzy Hash: 735176B09003498FEB14DFAAD548BEEBBF1BF88304F208459E41AA7360D7746944CF65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 32 7001c54-7001cf5 34 7001cf7-7001d01 32->34 35 7001d2e-7001d4e 32->35 34->35 36 7001d03-7001d05 34->36 40 7001d50-7001d5a 35->40 41 7001d87-7001db6 35->41 38 7001d07-7001d11 36->38 39 7001d28-7001d2b 36->39 42 7001d13 38->42 43 7001d15-7001d24 38->43 39->35 40->41 45 7001d5c-7001d5e 40->45 51 7001db8-7001dc2 41->51 52 7001def-7001ea9 CreateProcessA 41->52 42->43 43->43 44 7001d26 43->44 44->39 46 7001d60-7001d6a 45->46 47 7001d81-7001d84 45->47 49 7001d6c 46->49 50 7001d6e-7001d7d 46->50 47->41 49->50 50->50 54 7001d7f 50->54 51->52 53 7001dc4-7001dc6 51->53 63 7001eb2-7001f38 52->63 64 7001eab-7001eb1 52->64 55 7001dc8-7001dd2 53->55 56 7001de9-7001dec 53->56 54->47 58 7001dd4 55->58 59 7001dd6-7001de5 55->59 56->52 58->59 59->59 60 7001de7 59->60 60->56 74 7001f48-7001f4c 63->74 75 7001f3a-7001f3e 63->75 64->63 77 7001f5c-7001f60 74->77 78 7001f4e-7001f52 74->78 75->74 76 7001f40 75->76 76->74 80 7001f70-7001f74 77->80 81 7001f62-7001f66 77->81 78->77 79 7001f54 78->79 79->77 83 7001f86-7001f8d 80->83 84 7001f76-7001f7c 80->84 81->80 82 7001f68 81->82 82->80 85 7001fa4 83->85 86 7001f8f-7001f9e 83->86 84->83 88 7001fa5 85->88 86->85 88->88
                                                                                          APIs
                                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07001E96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: 5e2bd28be5b0ca4fff0c7fd445a78649a2dbaab9dd917a3cef90065417583538
                                                                                          • Instruction ID: 41fdd7b666faf5db5c34fc5793bba8b532b9f68b8993c2518594a82ac7ce8ebc
                                                                                          • Opcode Fuzzy Hash: 5e2bd28be5b0ca4fff0c7fd445a78649a2dbaab9dd917a3cef90065417583538
                                                                                          • Instruction Fuzzy Hash: 01A13AB1D0021DCFEB24DF68C8417EDBBF2BF49314F14866AE819A7280DB759985CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 89 7001c60-7001cf5 91 7001cf7-7001d01 89->91 92 7001d2e-7001d4e 89->92 91->92 93 7001d03-7001d05 91->93 97 7001d50-7001d5a 92->97 98 7001d87-7001db6 92->98 95 7001d07-7001d11 93->95 96 7001d28-7001d2b 93->96 99 7001d13 95->99 100 7001d15-7001d24 95->100 96->92 97->98 102 7001d5c-7001d5e 97->102 108 7001db8-7001dc2 98->108 109 7001def-7001ea9 CreateProcessA 98->109 99->100 100->100 101 7001d26 100->101 101->96 103 7001d60-7001d6a 102->103 104 7001d81-7001d84 102->104 106 7001d6c 103->106 107 7001d6e-7001d7d 103->107 104->98 106->107 107->107 111 7001d7f 107->111 108->109 110 7001dc4-7001dc6 108->110 120 7001eb2-7001f38 109->120 121 7001eab-7001eb1 109->121 112 7001dc8-7001dd2 110->112 113 7001de9-7001dec 110->113 111->104 115 7001dd4 112->115 116 7001dd6-7001de5 112->116 113->109 115->116 116->116 117 7001de7 116->117 117->113 131 7001f48-7001f4c 120->131 132 7001f3a-7001f3e 120->132 121->120 134 7001f5c-7001f60 131->134 135 7001f4e-7001f52 131->135 132->131 133 7001f40 132->133 133->131 137 7001f70-7001f74 134->137 138 7001f62-7001f66 134->138 135->134 136 7001f54 135->136 136->134 140 7001f86-7001f8d 137->140 141 7001f76-7001f7c 137->141 138->137 139 7001f68 138->139 139->137 142 7001fa4 140->142 143 7001f8f-7001f9e 140->143 141->140 145 7001fa5 142->145 143->142 145->145
                                                                                          APIs
                                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07001E96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: fbc0e0e78924c055f442e9266fbb99567109cf5bd012400c1b739fe107d3d745
                                                                                          • Instruction ID: dde76deecab862b081c34d4ccdda1952d3cf47adcc1e6355a6ce1f04cc18bcae
                                                                                          • Opcode Fuzzy Hash: fbc0e0e78924c055f442e9266fbb99567109cf5bd012400c1b739fe107d3d745
                                                                                          • Instruction Fuzzy Hash: A9912AB1D0021DDFEB24DF68C8417EEBBF2AF45310F14866AE819A7280DB749985CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 146 c2b0f0-c2b0ff 147 c2b101-c2b10e call c2ad54 146->147 148 c2b12b-c2b12f 146->148 153 c2b110 147->153 154 c2b124 147->154 150 c2b143-c2b184 148->150 151 c2b131-c2b13b 148->151 157 c2b191-c2b19f 150->157 158 c2b186-c2b18e 150->158 151->150 201 c2b116 call c2b388 153->201 202 c2b116 call c2b379 153->202 154->148 159 c2b1c3-c2b1c5 157->159 160 c2b1a1-c2b1a6 157->160 158->157 165 c2b1c8-c2b1cf 159->165 162 c2b1b1 160->162 163 c2b1a8-c2b1af call c2ad60 160->163 161 c2b11c-c2b11e 161->154 164 c2b260-c2b320 161->164 167 c2b1b3-c2b1c1 162->167 163->167 196 c2b322-c2b325 164->196 197 c2b328-c2b353 GetModuleHandleW 164->197 168 c2b1d1-c2b1d9 165->168 169 c2b1dc-c2b1e3 165->169 167->165 168->169 171 c2b1f0-c2b1f9 call c2ad70 169->171 172 c2b1e5-c2b1ed 169->172 177 c2b206-c2b20b 171->177 178 c2b1fb-c2b203 171->178 172->171 180 c2b229-c2b236 177->180 181 c2b20d-c2b214 177->181 178->177 187 c2b238-c2b256 180->187 188 c2b259-c2b25f 180->188 181->180 182 c2b216-c2b226 call c2ad80 call c2ad90 181->182 182->180 187->188 196->197 198 c2b355-c2b35b 197->198 199 c2b35c-c2b370 197->199 198->199 201->161 202->161
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00C2B346
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 2599fbbd880e200530d0e7f8e52e10f4fa07054b022f3b4b26d9f1d00ebd9714
                                                                                          • Instruction ID: 8399f17db09f2c88a19dcd024cdd1bd8cded16259ed85399c65924f9ac5d97ad
                                                                                          • Opcode Fuzzy Hash: 2599fbbd880e200530d0e7f8e52e10f4fa07054b022f3b4b26d9f1d00ebd9714
                                                                                          • Instruction Fuzzy Hash: 7A717670A00B158FDB24DF2AE4517AABBF1FF88700F00892ED49AD7A50DB74E945CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 203 c25cec-c25db9 CreateActCtxA 205 c25dc2-c25e1c 203->205 206 c25dbb-c25dc1 203->206 213 c25e2b-c25e2f 205->213 214 c25e1e-c25e21 205->214 206->205 215 c25e40 213->215 216 c25e31-c25e3d 213->216 214->213 218 c25e41 215->218 216->215 218->218
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00C25DA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 1f8760f17c5aef7df2513e503de658481e8bbe9ded8bd9ef61412dab8baad0bd
                                                                                          • Instruction ID: 063ba23905c5b9384bab18a6c924ad5eb3d9a3c949b26c07074c270d1f6813a8
                                                                                          • Opcode Fuzzy Hash: 1f8760f17c5aef7df2513e503de658481e8bbe9ded8bd9ef61412dab8baad0bd
                                                                                          • Instruction Fuzzy Hash: 5741D0B1C00729CFEB25CFA9D844BCEBBB5BF89704F20806AD419AB251DB755946CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 219 c23e44-c25db9 CreateActCtxA 222 c25dc2-c25e1c 219->222 223 c25dbb-c25dc1 219->223 230 c25e2b-c25e2f 222->230 231 c25e1e-c25e21 222->231 223->222 232 c25e40 230->232 233 c25e31-c25e3d 230->233 231->230 235 c25e41 232->235 233->232 235->235
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00C25DA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: eca6917dbe637182c6043512e7fd6ee3c20d332b7258ab8b30bb67da5f5b685d
                                                                                          • Instruction ID: 51a4710d5c7e544816a4af8f3a9cdfebf2d80022e4bf2ed7c135611ae4a7c6c4
                                                                                          • Opcode Fuzzy Hash: eca6917dbe637182c6043512e7fd6ee3c20d332b7258ab8b30bb67da5f5b685d
                                                                                          • Instruction Fuzzy Hash: 2541B2B0C00719CBDB24DFA9D8447DEBBF5BF48704F20806AD419AB255DB756946CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 236 7001400-7001404 237 70013f0-70013f5 236->237 238 7001406-7001453 236->238 240 7001463-7001493 Wow64SetThreadContext 238->240 241 7001455-7001461 238->241 243 7001495-700149b 240->243 244 700149c-70014cc 240->244 241->240 243->244
                                                                                          APIs
                                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07001486
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThreadWow64
                                                                                          • String ID:
                                                                                          • API String ID: 983334009-0
                                                                                          • Opcode ID: a14edeb3bdb902735ae53ab29b2f65d5d4b788d9f4ff9f01dd1d364b042bed0d
                                                                                          • Instruction ID: 55594c6f0c08d713e86e604fbf99cc967013c5d98b2241d09bc2d60f93c1b3b1
                                                                                          • Opcode Fuzzy Hash: a14edeb3bdb902735ae53ab29b2f65d5d4b788d9f4ff9f01dd1d364b042bed0d
                                                                                          • Instruction Fuzzy Hash: 042159B6D003098FEB10CFAAC4817EEBBF4EF48325F10842AE419A7280D7789545CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 248 70019d0-7001a26 250 7001a36-7001a75 WriteProcessMemory 248->250 251 7001a28-7001a34 248->251 253 7001a77-7001a7d 250->253 254 7001a7e-7001aae 250->254 251->250 253->254
                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07001A68
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: 895425b196d94a7aeaa1fd45e2a16fd9848202231f76a2522d43bbc2d92420fa
                                                                                          • Instruction ID: eaa62dfc016966f7bf68ddf8a4b37bf35828a509acfbd021dbf176830d32f774
                                                                                          • Opcode Fuzzy Hash: 895425b196d94a7aeaa1fd45e2a16fd9848202231f76a2522d43bbc2d92420fa
                                                                                          • Instruction Fuzzy Hash: DA2128B6900319DFDB10CFA9C9817DEBBF5FF48310F10882AE559A7240D7789955CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 258 70019d8-7001a26 260 7001a36-7001a75 WriteProcessMemory 258->260 261 7001a28-7001a34 258->261 263 7001a77-7001a7d 260->263 264 7001a7e-7001aae 260->264 261->260 263->264
                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07001A68
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: fb444a52eaee774d0191414f2e61b69ce3c235a0e18a1a75d31a1632fed73d00
                                                                                          • Instruction ID: 55ee29d0d259417fda27a3d18dd28eb314213f77b2277a6e36426ea63e890617
                                                                                          • Opcode Fuzzy Hash: fb444a52eaee774d0191414f2e61b69ce3c235a0e18a1a75d31a1632fed73d00
                                                                                          • Instruction Fuzzy Hash: F62127B290030D9FDB10CFAAC881BDEBBF5FF48310F10842AE919A7240D7789951CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 268 7001ac0-7001b55 ReadProcessMemory 271 7001b57-7001b5d 268->271 272 7001b5e-7001b8e 268->272 271->272
                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07001B48
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: dca3899fb028c822a14a9fc6337a1355e097449a665ca2a9598fe4d52c8c43ff
                                                                                          • Instruction ID: c367add00c9553f8ace01cfd3b31de49e2e3d16e8b8aaeb6488f23621ea57d6d
                                                                                          • Opcode Fuzzy Hash: dca3899fb028c822a14a9fc6337a1355e097449a665ca2a9598fe4d52c8c43ff
                                                                                          • Instruction Fuzzy Hash: A02116B18003199FDB10CFAAC981BDEFBF5FF48310F10882AE559A7240D7399545DBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 286 7001ac8-7001b55 ReadProcessMemory 289 7001b57-7001b5d 286->289 290 7001b5e-7001b8e 286->290 289->290
                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07001B48
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: 9e0ef2f3c592d58d508b906a4f8090b2d0bd662856aaff7aa8e14ce6b92d18f4
                                                                                          • Instruction ID: c905e7cdeb0bc66c6d26b8b3d69d76b733bf2cda122ae81aed443c962127becc
                                                                                          • Opcode Fuzzy Hash: 9e0ef2f3c592d58d508b906a4f8090b2d0bd662856aaff7aa8e14ce6b92d18f4
                                                                                          • Instruction Fuzzy Hash: E12128B18003499FDB10CFAAC881BDEFBF5FF48320F10842AE519A7240D7799501CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 276 7001408-7001453 278 7001463-7001493 Wow64SetThreadContext 276->278 279 7001455-7001461 276->279 281 7001495-700149b 278->281 282 700149c-70014cc 278->282 279->278 281->282
                                                                                          APIs
                                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07001486
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThreadWow64
                                                                                          • String ID:
                                                                                          • API String ID: 983334009-0
                                                                                          • Opcode ID: 3f733b76e4fdb1a4adb6861d5c7a65b9b7a136bace3855b82996d30df9415a61
                                                                                          • Instruction ID: 868bacd4b1a17116305c4826f443379f26376ece114d2b067b7a36cadcb5fd1b
                                                                                          • Opcode Fuzzy Hash: 3f733b76e4fdb1a4adb6861d5c7a65b9b7a136bace3855b82996d30df9415a61
                                                                                          • Instruction Fuzzy Hash: 362129B1D003099FDB10DFAAC4857EEBBF4EF48324F14842AD459A7240DB789945CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 294 c2d5c8-c2d65c DuplicateHandle 295 c2d665-c2d682 294->295 296 c2d65e-c2d664 294->296 296->295
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C2D64F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 2202868416ee1d91f299822aef154b4bbd4a58d46dccbf23308a941b561b4fd9
                                                                                          • Instruction ID: d1d6055b95517e8fbdce835764dceecce9540a049f9d35ae9925b8f0c2971792
                                                                                          • Opcode Fuzzy Hash: 2202868416ee1d91f299822aef154b4bbd4a58d46dccbf23308a941b561b4fd9
                                                                                          • Instruction Fuzzy Hash: F121C2B59002589FDB10CFAAD984ADEFBF8EB48710F14841AE919A3350D378A954CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 299 c2adb8-c2b5a8 301 c2b5b0-c2b5df LoadLibraryExW 299->301 302 c2b5aa-c2b5ad 299->302 303 c2b5e1-c2b5e7 301->303 304 c2b5e8-c2b605 301->304 302->301 303->304
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00C2B3C1,00000800,00000000,00000000), ref: 00C2B5D2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 15dbb87e18eb34066ce0507539ac13d81a7f301d32d7e1bbb9d6057345d0d850
                                                                                          • Instruction ID: ae559c82d216d16a280804a2006211ea58cd2e70082275f6a21b23c5eac3518c
                                                                                          • Opcode Fuzzy Hash: 15dbb87e18eb34066ce0507539ac13d81a7f301d32d7e1bbb9d6057345d0d850
                                                                                          • Instruction Fuzzy Hash: EB1126B6D043098FDB10CF9AD444BDEFBF8EB88710F14842AE529A7600C375A945CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00C2B3C1,00000800,00000000,00000000), ref: 00C2B5D2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 6cec5e46e4327f913f974141496aa80d9719aa3f1f00d4120f8605c4d2e3a95e
                                                                                          • Instruction ID: ee26424541051d14caa78b64a39f525ea11712ca373e35379c8e76d946881c3b
                                                                                          • Opcode Fuzzy Hash: 6cec5e46e4327f913f974141496aa80d9719aa3f1f00d4120f8605c4d2e3a95e
                                                                                          • Instruction Fuzzy Hash: A71117B6C003499FDB10CFAAD444ADEFBF4AF48710F14842AE419A7600C375A945CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07001986
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: b4586304accab39576d1cbf31e58ec8e7db71cd4b08ff64f8b55e38d307b6f05
                                                                                          • Instruction ID: 232d0e85a97664a43bb892be1b226c734f90f438802cce4377341d7bc61adb75
                                                                                          • Opcode Fuzzy Hash: b4586304accab39576d1cbf31e58ec8e7db71cd4b08ff64f8b55e38d307b6f05
                                                                                          • Instruction Fuzzy Hash: 831126B6900209DFDB10DFAAC8457DEBBF5AF48320F24881AE569A7250C775A945CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07001986
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: afa5b3c2ebdbdd9376467d1c865e385f56bca716fbf4d03d4397f2b46b63a54d
                                                                                          • Instruction ID: 450d512459a1f0dc9a87a43bfd65f63121346f39a4e17d988e0e3d06d1733537
                                                                                          • Opcode Fuzzy Hash: afa5b3c2ebdbdd9376467d1c865e385f56bca716fbf4d03d4397f2b46b63a54d
                                                                                          • Instruction Fuzzy Hash: AF1126728003499FDB10DFAAC845BDFBBF5AF48320F14881AE529A7250C775A940CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ResumeThread
                                                                                          • String ID:
                                                                                          • API String ID: 947044025-0
                                                                                          • Opcode ID: 8f0ff2041f58091b4045ae7bb77fd1c45a16a76b9e12c6919217d202d48c790e
                                                                                          • Instruction ID: 67d3657622457fe8c432da69e4547e4c31190723c07aa92f254e8d6a4d0e92b9
                                                                                          • Opcode Fuzzy Hash: 8f0ff2041f58091b4045ae7bb77fd1c45a16a76b9e12c6919217d202d48c790e
                                                                                          • Instruction Fuzzy Hash: 4E1128B19003498BDB24DFAAD44579EFBF4AB88624F24881AD529A7640C7756540CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0700487D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: be5850188668d99eaf8fdced2798e5dc37f0cc4c82f3bc96497b21a02d44598e
                                                                                          • Instruction ID: 479fab289383d22ee86fa0dab711690ca56708161a37347954afab62b61b09ff
                                                                                          • Opcode Fuzzy Hash: be5850188668d99eaf8fdced2798e5dc37f0cc4c82f3bc96497b21a02d44598e
                                                                                          • Instruction Fuzzy Hash: 871106B5800389DFDB10DF9AD545BDEFBF8EB49320F108859EA19A7240C375A944CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00C2B346
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: d04245db39c9a05b47b7be90e2fe9029facbe914b3968c700ce079ed33ccc447
                                                                                          • Instruction ID: 047221c62aa59592d7e3439f1b65df069dfe93fa918f100aaef54fc7543bc4e8
                                                                                          • Opcode Fuzzy Hash: d04245db39c9a05b47b7be90e2fe9029facbe914b3968c700ce079ed33ccc447
                                                                                          • Instruction Fuzzy Hash: BE1110B6C007498FCB10CF9AD444BDEFBF4AF88314F10841AD429A7610C375A945CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0700487D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: 6fc3f9c9d137892b8c3012ed6e8b04a88afa68a77e54c73dd58d25da6243e558
                                                                                          • Instruction ID: 270d6521facb601961909b852ed0db91abbef34737261a23452959f66dd58d19
                                                                                          • Opcode Fuzzy Hash: 6fc3f9c9d137892b8c3012ed6e8b04a88afa68a77e54c73dd58d25da6243e558
                                                                                          • Instruction Fuzzy Hash: FD11FEB58003498FDB10CF9AC585BDEBBF4EB08320F20881AE918A7240C375A944CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c28014d84d834bd74c6ecd7f8aefdc1ba58cc2cfc96c01ca7a0d34a2c198a228
                                                                                          • Instruction ID: 84aff1b753c9f2b9bcedc1431f64d5c9bdbeb401916bcfe61f18867e0ad28030
                                                                                          • Opcode Fuzzy Hash: c28014d84d834bd74c6ecd7f8aefdc1ba58cc2cfc96c01ca7a0d34a2c198a228
                                                                                          • Instruction Fuzzy Hash: FC715174D14218CFDB40DFA9D884AEDBBB5FF08310F41A459E808A7355D7709989CFA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 93922add6400bfb65374979b8d607f2897b81b2a1b22aae44ae7df516ebbcc5c
                                                                                          • Instruction ID: f48291951b1a4381639355f5e2888ad2233b06ade8bdbe8d6b9adecdb78e2fc3
                                                                                          • Opcode Fuzzy Hash: 93922add6400bfb65374979b8d607f2897b81b2a1b22aae44ae7df516ebbcc5c
                                                                                          • Instruction Fuzzy Hash: EA51C031B102069FDB14EBB9DC549AEBBF6FFC4720B258969E819D7350EB709D018790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 05534b798f8c24e52ef22467b881fb119f50408e42f34925fe354e3d0858e13b
                                                                                          • Instruction ID: f3a2bd60e116e7155e0d55c3e6a65238105ad36238bdeb8d98ac81f7f76ce43a
                                                                                          • Opcode Fuzzy Hash: 05534b798f8c24e52ef22467b881fb119f50408e42f34925fe354e3d0858e13b
                                                                                          • Instruction Fuzzy Hash: F9418F74E18209CFEB40CF5BD9409BEBBF9FF4D300BA29494D809A7221DB30A951CB55
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d52b63a76d776b890c89d270e88dfbb3b217407ca900dd91ffefc78f760e9002
                                                                                          • Instruction ID: 4c2ec045c45f712b0f2533d438b814f1b9bc8737220e31c94da2e4eb4034bf3b
                                                                                          • Opcode Fuzzy Hash: d52b63a76d776b890c89d270e88dfbb3b217407ca900dd91ffefc78f760e9002
                                                                                          • Instruction Fuzzy Hash: E2412574E04209DFDB40CFAAE885BEDBBB5FF48310F509129E805A7250DB715A81CFA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9ae5095b47ad4716654885c61def8052c68431d3a65cef06018acadf915d9709
                                                                                          • Instruction ID: 7dc5aebe7c865f312f0892694e978120a68d525209e99012c0d281755b77a1a5
                                                                                          • Opcode Fuzzy Hash: 9ae5095b47ad4716654885c61def8052c68431d3a65cef06018acadf915d9709
                                                                                          • Instruction Fuzzy Hash: 07316B76900209AFDB14CFAAD844ADEBFF9EF48310F10842AE919E7310D770A941CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 455cc1700f1ed8c8af384540903d0c21c85f47bbf9bff403b54ec46d3c024036
                                                                                          • Instruction ID: e3a137bcce8cf4ed06683c2010e7d62669198953fe81705b139d8e991098c66f
                                                                                          • Opcode Fuzzy Hash: 455cc1700f1ed8c8af384540903d0c21c85f47bbf9bff403b54ec46d3c024036
                                                                                          • Instruction Fuzzy Hash: 32316734915208CFDB40CF96E845AEEBBF8FB4D300F515094E805A3264CBB59AA1CF94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7b580f0b1d2c4b510591179da1196f39399883d2faca7342d97cceee0f6482a3
                                                                                          • Instruction ID: 0bdea6054c1442260f3c48b4b345e071dd18223a7fd38582204a81263ff708d5
                                                                                          • Opcode Fuzzy Hash: 7b580f0b1d2c4b510591179da1196f39399883d2faca7342d97cceee0f6482a3
                                                                                          • Instruction Fuzzy Hash: 2D31E6B0D016188FEB48DFAAC8446DEBBF6BF89300F14C02AD829AB354EB745945CF54
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2b881b835a8c51057d69315904998ba8596ced8a2ebf112ae3c37e81dbc60bfa
                                                                                          • Instruction ID: f9ee3fe4b2954dda94b5095518d1b761c20c8135dcd7ff575caf86f6d345e695
                                                                                          • Opcode Fuzzy Hash: 2b881b835a8c51057d69315904998ba8596ced8a2ebf112ae3c37e81dbc60bfa
                                                                                          • Instruction Fuzzy Hash: 7C31C074E012189FDF08DFAAD8406EEBBF6BF88700F50802AE405B7364EB3559429B94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465327035.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bbd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 882a64886374e6d15a384df4ed350087cc7579c78d42ff8bb0a4ea3558ca2408
                                                                                          • Instruction ID: 9a02bfb7ada71a31392cd11b9b1fdbd1715187a5e01129e840b3b110ec6faf2d
                                                                                          • Opcode Fuzzy Hash: 882a64886374e6d15a384df4ed350087cc7579c78d42ff8bb0a4ea3558ca2408
                                                                                          • Instruction Fuzzy Hash: E8212871504204DFDB04DF10D9C0B66BBE5FB94314F20C5A9E8090B356D37AE856CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465327035.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bbd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c786bc873852c4caa3966d64ec9b068268dbc89728f64cdbc0d1375864747281
                                                                                          • Instruction ID: bf963b21f1eae992f5a29ede839f91292b5839f4690bd5669f8cd8bdf22d8ad8
                                                                                          • Opcode Fuzzy Hash: c786bc873852c4caa3966d64ec9b068268dbc89728f64cdbc0d1375864747281
                                                                                          • Instruction Fuzzy Hash: F9212571504240EFDB25DF10D9C0B76BFE5FB98318F20C5A9E8090B256D37AD856CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465373985.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bcd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ba8756e8f5f7555102b1ea58a5c7190806b097641c7a8800c7282aa01401e025
                                                                                          • Instruction ID: 323f78fd2e9845d7c851eaefbdc52d89176fcce110745894d1b2c3e5c9f40cfb
                                                                                          • Opcode Fuzzy Hash: ba8756e8f5f7555102b1ea58a5c7190806b097641c7a8800c7282aa01401e025
                                                                                          • Instruction Fuzzy Hash: 6521CF79604240AFDB14DF28D9D4F26BBE5FB84314F20C5BDE84A4B296C336D847CA62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465373985.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bcd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f2824dfe9e0a9df8548c1a4adabc4ba9f2e61e83894cf78ab09032054a869ae3
                                                                                          • Instruction ID: 053c9c920eb9b13d088bd57eaf6e14fe43e8e31186b1f416173134a6679e11f5
                                                                                          • Opcode Fuzzy Hash: f2824dfe9e0a9df8548c1a4adabc4ba9f2e61e83894cf78ab09032054a869ae3
                                                                                          • Instruction Fuzzy Hash: 0321B0B9604244AFDB05DF50D9C4F26BBE5FB84314F24C5BDE8494F292C336D846CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c437590e1f495d58773ce8ebabbfb8b5d45c230996acfef436c10c09df708a07
                                                                                          • Instruction ID: 62f218a48076ecd3f0b3203b41f1a9bbb5b3b33590f33d8b653f62aeadf49fa8
                                                                                          • Opcode Fuzzy Hash: c437590e1f495d58773ce8ebabbfb8b5d45c230996acfef436c10c09df708a07
                                                                                          • Instruction Fuzzy Hash: AE213A70E48308DFDB88DFA9C9416AEBBB5BF49300F5190ADD805AB251D7709E80DB98
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cb3b0d4a06698075785fe3b4703baf79f8204bdaf46942a1b047c134f3bfacc9
                                                                                          • Instruction ID: 6f5d0f6b6f9ec88bf2abae5f30522d88710929f4cd42d4e470c86bb14779faa0
                                                                                          • Opcode Fuzzy Hash: cb3b0d4a06698075785fe3b4703baf79f8204bdaf46942a1b047c134f3bfacc9
                                                                                          • Instruction Fuzzy Hash: 5631F4B0D01258DFDB60DFDAC984B8DBBF4AB48714F258159E804BB240C7B66985CF95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465373985.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bcd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: de4b61cdfb0a42966473224f0286b82e5f594130864bf74b646cd03c2c3d6d1c
                                                                                          • Instruction ID: 51b15f5cc697f345f6670969bd2a2289b884768c392dfb514105d92dd3a6cc0c
                                                                                          • Opcode Fuzzy Hash: de4b61cdfb0a42966473224f0286b82e5f594130864bf74b646cd03c2c3d6d1c
                                                                                          • Instruction Fuzzy Hash: 1D21A4795093808FCB12CF24D594B15BFB1EB45314F28C5EED8498B697C33A980ACB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: df19e2e08e6acc37b2b707b1d1e8c3887fc9c34a0965479ef115d97dfd3e7741
                                                                                          • Instruction ID: 151696ada1060ec04df817a291112bcbb5d728fef339f339e245a61387c1482d
                                                                                          • Opcode Fuzzy Hash: df19e2e08e6acc37b2b707b1d1e8c3887fc9c34a0965479ef115d97dfd3e7741
                                                                                          • Instruction Fuzzy Hash: 1F111F71F0021A8BCB54EBAA98145EEB7F6BB85210B504169C904E7240EF358E45CB95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d21a58699c3e7611dedf449666a342c664e7ffd4bf066df58260ff8a3677fcc7
                                                                                          • Instruction ID: 30c07ebffd9bdba5aeb38912537fbaf2b3ce71660cb418acd6a1a940c153ce73
                                                                                          • Opcode Fuzzy Hash: d21a58699c3e7611dedf449666a342c664e7ffd4bf066df58260ff8a3677fcc7
                                                                                          • Instruction Fuzzy Hash: D42103B58043499FDB10CFAAD884BDEBFF4FB48310F10841AE919A7200C374A944CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465327035.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bbd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                                                          • Instruction ID: 5dc1a7ce38a9430a25f586be2fb4a81adf68cb9a725f9755ba55b4f7d2fe2d7d
                                                                                          • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                                                          • Instruction Fuzzy Hash: 5D11E676504280CFCB15CF10D5C4B66BFB1FB94318F24C6E9D8490B656C33AD85ACBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465327035.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bbd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                                                          • Instruction ID: adb9c6c51a1cc0b1e7098439b0b74411b26d8fb6005ae0c3e9a3f9624ce3d331
                                                                                          • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                                                          • Instruction Fuzzy Hash: 8C11D376504240DFCB15CF10D5C4B66BFB1FB94324F24C6A9D8090B756C37AE85ACBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465373985.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_bcd000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
                                                                                          • Instruction ID: 8a318f8ad8a1a1eeff2e6f15b7b5b6a2403223ef0f0f6706a41f28d5d8fe9c62
                                                                                          • Opcode Fuzzy Hash: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
                                                                                          • Instruction Fuzzy Hash: 9E118B7A604280DFCB15CF10D9C4B15BBA1FB84318F24C6AED8494F696C33AD84ACB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a41b551ba55c8ccafc7b4c596204e39e47eed4c416a8f484df3c0769b094d6da
                                                                                          • Instruction ID: aa8f28e31d3c8959558ed8b8580b7c05fa045c6cdeffb94bf752656250b9259b
                                                                                          • Opcode Fuzzy Hash: a41b551ba55c8ccafc7b4c596204e39e47eed4c416a8f484df3c0769b094d6da
                                                                                          • Instruction Fuzzy Hash: B4F0C774D0D208DFDB44DFA7D9455ACFBF89B4B300F4191AAC80993321DA355784CB45
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6166930c5c2b68e4479147143dbeb5353aab13e9b81dbbbae02e229c7e3f6c04
                                                                                          • Instruction ID: 9fcdc922daac46499b8ad193b5c7ac3eced99d7b820da1a82b90b4943b6db7c5
                                                                                          • Opcode Fuzzy Hash: 6166930c5c2b68e4479147143dbeb5353aab13e9b81dbbbae02e229c7e3f6c04
                                                                                          • Instruction Fuzzy Hash: 74F01574E04208EFCB84EFA8C940AACBBB4EB48300F10C0AAAC08A3300D6359A51DF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: be9ae06ba5a723dde73544a8c6e329e6cee0c778712b753de2a11bf6892bc5c6
                                                                                          • Instruction ID: 6f293fadecb7ef69530f7e009853c5d44c1be9eba91582aaf951541220611c33
                                                                                          • Opcode Fuzzy Hash: be9ae06ba5a723dde73544a8c6e329e6cee0c778712b753de2a11bf6892bc5c6
                                                                                          • Instruction Fuzzy Hash: C1E0C974E04208EFCB84DFE9D945AACBBF4EB49300F10C1AA9D1893350DB359A52DF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5703f96d9c64b3ed72881f69fe534935b80a405b988ff7731ed0fb17fcc94576
                                                                                          • Instruction ID: b12d44bdbab9ebdc7fe0520c9fd68c1fea41e1c235c69be854fd38a2d459ac3e
                                                                                          • Opcode Fuzzy Hash: 5703f96d9c64b3ed72881f69fe534935b80a405b988ff7731ed0fb17fcc94576
                                                                                          • Instruction Fuzzy Hash: 2FE0E574E04208EFCB94DFA9D9416ACBBF4EB49200F10C0AAD81893351D6359A42CF85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4b4fdae5123e504251ca431c2ff164c05bfe6c6a8eee58fa15fe7b7b2bedbaf3
                                                                                          • Instruction ID: 973c4ea4659df5e8267fc713137b939b7424e848799943a30d5d1348719ee829
                                                                                          • Opcode Fuzzy Hash: 4b4fdae5123e504251ca431c2ff164c05bfe6c6a8eee58fa15fe7b7b2bedbaf3
                                                                                          • Instruction Fuzzy Hash: 19E0C274E04208EFCB84DFA9D8916ACBBF4EB49200F1081E9980893341DB359A42CB84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5703f96d9c64b3ed72881f69fe534935b80a405b988ff7731ed0fb17fcc94576
                                                                                          • Instruction ID: 1e8484bdfd85a874cdb2a5d848e32f3da4170b001d07d7d3673ff0f3f5fb6425
                                                                                          • Opcode Fuzzy Hash: 5703f96d9c64b3ed72881f69fe534935b80a405b988ff7731ed0fb17fcc94576
                                                                                          • Instruction Fuzzy Hash: 58E0E574E04208EFCB84DFA8D9416ACBBF4EB49200F5081ADD81893340D6359A82DF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9f848f3f7204e090c0bd704ae2f4aa00152d97576892fd090ac7d9927c91ac5c
                                                                                          • Instruction ID: d12c53a6cc7abaccabcd8000228c0666cab0743ab51894b0fbba45fab27650ae
                                                                                          • Opcode Fuzzy Hash: 9f848f3f7204e090c0bd704ae2f4aa00152d97576892fd090ac7d9927c91ac5c
                                                                                          • Instruction Fuzzy Hash: 94F07A74911228CFEB60DF28ECA9BD9BBB1BB09305F1091E9D50DA6240DB749EC1CF52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 16ea6ece78da1b8f3e601175b7c24e42f287677144e487a4ea95f6dc1b53dcd4
                                                                                          • Instruction ID: 8b4363788709c0196dcac076336e8f25900594198deded30be55a12ff56a61bb
                                                                                          • Opcode Fuzzy Hash: 16ea6ece78da1b8f3e601175b7c24e42f287677144e487a4ea95f6dc1b53dcd4
                                                                                          • Instruction Fuzzy Hash: 4BE0127590A308DFDB44DFB4E80569E7BFCEB4A211F1045EAE40AA3120EF714A85DB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9d99f7fd07694b3c5217130d88c63209f6a5894f45c1213a5b09abc0b3acb6d7
                                                                                          • Instruction ID: e99b0e320357f04606998907c4c10997f1d2412c5c9da6e03da400e4793e88bd
                                                                                          • Opcode Fuzzy Hash: 9d99f7fd07694b3c5217130d88c63209f6a5894f45c1213a5b09abc0b3acb6d7
                                                                                          • Instruction Fuzzy Hash: 9EE0ECB4D55308EFDB84DFA9D9456ADBBF8AB09201F9000B9D80893351EA305A84CB45
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f4203d822a9ca57f83189baad0d97fde885575e53e592d4c5d63e9a117794e2f
                                                                                          • Instruction ID: b2d10188a7706d27b9302b3b7ce06a3cfdb4e94dabf36925e755fdc5321c7ab9
                                                                                          • Opcode Fuzzy Hash: f4203d822a9ca57f83189baad0d97fde885575e53e592d4c5d63e9a117794e2f
                                                                                          • Instruction Fuzzy Hash: E8E08C34948208EBCB04DB94D941A6CBBB4AB46300F1080ACCC0857340CA319E92CB88
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8c54832aade3f2ebf98f1d3e9f90db5ab74fcaa34e23f591660df8882ce8169d
                                                                                          • Instruction ID: 89def1c984282c88ee277eb2e4e0b0028edaafeb3c840c534d48e73a0ce1313b
                                                                                          • Opcode Fuzzy Hash: 8c54832aade3f2ebf98f1d3e9f90db5ab74fcaa34e23f591660df8882ce8169d
                                                                                          • Instruction Fuzzy Hash: 41F05FB4A915298FDB64CF15CD8578EBBB0BF49315F0040EADA8EA3200DB745E85CF0A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9fcf607bceb2bb9961b1293f763d17d57529d742a2c67383b0ae2e351ac93f14
                                                                                          • Instruction ID: 22bc5ca2131ecc50f1f82e3ae521c294b68bd13d701cce1ad46ee2eed9ee3566
                                                                                          • Opcode Fuzzy Hash: 9fcf607bceb2bb9961b1293f763d17d57529d742a2c67383b0ae2e351ac93f14
                                                                                          • Instruction Fuzzy Hash: 18B02B3001530447E21C2650640E3317B9CD70B301F000854BA0C001510F70D080C698
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 545c1f1e979951089b9e951adce9a5efc444e5bf910493f60bbe956a73929162
                                                                                          • Instruction ID: f43f76a209af27b721925f1e797df859456248ded07ef11cdd8ebff60ef9d153
                                                                                          • Opcode Fuzzy Hash: 545c1f1e979951089b9e951adce9a5efc444e5bf910493f60bbe956a73929162
                                                                                          • Instruction Fuzzy Hash: C0C08C310513048BE21827A0A80E324BF6CAB0A702F400068F649451504F70D180C6AA
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9fad5e5205e8c5aa6c988c23aef2d96468a6375078c3a8e573edb6f49298f907
                                                                                          • Instruction ID: 1a97c9b4c1ab9b3d69132bb88e2bc8d28add4a879176221d0e2c1fa78316c95c
                                                                                          • Opcode Fuzzy Hash: 9fad5e5205e8c5aa6c988c23aef2d96468a6375078c3a8e573edb6f49298f907
                                                                                          • Instruction Fuzzy Hash: 8AB01276254641FA62C163E1CC95B2F9551FBE2B00B85CC123B8440010C6A048A5E15F
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: /
                                                                                          • API String ID: 0-2043925204
                                                                                          • Opcode ID: a3c4b4408c42c312a0122434400eb7879ac2ea27da9c7a7864a88fb4b473260c
                                                                                          • Instruction ID: 1ac0cc43e0dffdecc5f96fc062d47d8a6f245a4096c10977f16dfe7afcf748d0
                                                                                          • Opcode Fuzzy Hash: a3c4b4408c42c312a0122434400eb7879ac2ea27da9c7a7864a88fb4b473260c
                                                                                          • Instruction Fuzzy Hash: 7B416E71E05A588FEB6CCF6B8D4069BFAF7AFC9301F14C1B9880CAB255DB3045828E05
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f4e574092a8f4a52cd69e1f574e401d524c6b0c45c0f6b8d39285395d5e07a15
                                                                                          • Instruction ID: e0eb37d4b7e7e637f92710b0e73166f0800610567070b3fd326662f9cb61f690
                                                                                          • Opcode Fuzzy Hash: f4e574092a8f4a52cd69e1f574e401d524c6b0c45c0f6b8d39285395d5e07a15
                                                                                          • Instruction Fuzzy Hash: B6D1DEB07017118FEB29DB75C860BAEB7E6AF8A710F14456DE146CB6D1DB34E801CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 17d485909ce7bd7bf94c254c348d08190baf54cd607a6d73b0e50d05da0ddace
                                                                                          • Instruction ID: 037871b5fe1bcac5f2444d1bcf9b826e2605cc9cf87fc4a2e0a05a44ec48f3e8
                                                                                          • Opcode Fuzzy Hash: 17d485909ce7bd7bf94c254c348d08190baf54cd607a6d73b0e50d05da0ddace
                                                                                          • Instruction Fuzzy Hash: 3BE1F7B4E04219CFDB14DFA8C580AAEFBB2BF89315F248269D414AB355D730AD41CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474870228.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7000000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7930b320f36b74d80a16fe1051db7a65950350762c441821f98695f7197fd571
                                                                                          • Instruction ID: b0afaea964a5f0d6aba0754e5e126fba192b8447b6dbf9b86e52a6de6f96861f
                                                                                          • Opcode Fuzzy Hash: 7930b320f36b74d80a16fe1051db7a65950350762c441821f98695f7197fd571
                                                                                          • Instruction Fuzzy Hash: B3E1F4B4E04219CFDB14DFA9C580AAEBBF2BF89315F248269D414AB355D730AD41CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a985a0dc00f752b840e742d91f0012371200ad0b07598d5640c69cda8f66c24e
                                                                                          • Instruction ID: 9ccc316ebf48470fd8550a2d028085f87df851acbfc64a0a681ba5e05f50b868
                                                                                          • Opcode Fuzzy Hash: a985a0dc00f752b840e742d91f0012371200ad0b07598d5640c69cda8f66c24e
                                                                                          • Instruction Fuzzy Hash: 74D11735D2471ADADB10EBA4D9906DDB3B1FF95300F50C79AE5093B210EBB06AC4CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1465799598.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_c20000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7f405c45857e49be3e78188d04614e371b14b0ae8f3c0fead742af7cffc5f449
                                                                                          • Instruction ID: 96d9392b52558526869f7a06f98e5c7a7721a8eb7aaa9c9ec7e673bb1fea52b6
                                                                                          • Opcode Fuzzy Hash: 7f405c45857e49be3e78188d04614e371b14b0ae8f3c0fead742af7cffc5f449
                                                                                          • Instruction Fuzzy Hash: 73A17E32E002298FCF05DFB5E94459EB7B2FF95300B25817EE816AB665DB71D906CB80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1474139046.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_6c50000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 76d5e224fc5e301beafb7ae833015dc04643555958ca6be94d81a8eeaafba29e
                                                                                          • Instruction ID: 9002f21408e66b4ab9bc4d7fd8df8304bcb6d5905365f6d3d650b4c927356d87
                                                                                          • Opcode Fuzzy Hash: 76d5e224fc5e301beafb7ae833015dc04643555958ca6be94d81a8eeaafba29e
                                                                                          • Instruction Fuzzy Hash: 66419F71E05B548FE759CF6B8D4028AFBF3AFC9201F19C1BA845CAB165E73449868F11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:1.5%
                                                                                          Dynamic/Decrypted Code Coverage:2.7%
                                                                                          Signature Coverage:5.8%
                                                                                          Total number of Nodes:556
                                                                                          Total number of Limit Nodes:68
                                                                                          execution_graph 95613 41f130 95614 41f13b 95613->95614 95616 41b960 95613->95616 95617 41b986 95616->95617 95624 409d30 95617->95624 95619 41b992 95623 41b9b3 95619->95623 95632 40c1b0 95619->95632 95621 41b9a5 95668 41a6a0 95621->95668 95623->95614 95625 409d3d 95624->95625 95671 409c80 95624->95671 95627 409d44 95625->95627 95683 409c20 95625->95683 95627->95619 95633 40c1d5 95632->95633 96102 40b1b0 95633->96102 95635 40c22c 96106 40ae30 95635->96106 95637 40c4a3 95637->95621 95638 40c252 95638->95637 96115 414390 95638->96115 95640 40c297 95640->95637 96118 408a60 95640->96118 95642 40c2db 95642->95637 96125 41a4f0 95642->96125 95646 40c331 95647 40c338 95646->95647 96137 41a000 95646->96137 95648 41bdb0 2 API calls 95647->95648 95650 40c345 95648->95650 95650->95621 95652 40c382 95653 41bdb0 2 API calls 95652->95653 95654 40c389 95653->95654 95654->95621 95655 40c392 95656 40f490 3 API calls 95655->95656 95657 40c406 95656->95657 95657->95647 95658 40c411 95657->95658 95659 41bdb0 2 API calls 95658->95659 95660 40c435 95659->95660 96142 41a050 95660->96142 95663 41a000 2 API calls 95664 40c470 95663->95664 95664->95637 96147 419e10 95664->96147 95667 41a6a0 2 API calls 95667->95637 95669 41a6bf ExitProcess 95668->95669 95670 41af50 LdrLoadDll 95668->95670 95670->95669 95702 418bb0 95671->95702 95675 409ca6 95675->95625 95676 409c9c 95676->95675 95709 41b2a0 95676->95709 95678 409ce3 95678->95675 95720 409aa0 95678->95720 95680 409d03 95726 409620 LdrLoadDll 95680->95726 95682 409d15 95682->95625 96077 41b590 95683->96077 95686 41b590 LdrLoadDll 95687 409c4b 95686->95687 95688 41b590 LdrLoadDll 95687->95688 95689 409c61 95688->95689 95690 40f170 95689->95690 95691 40f189 95690->95691 96085 40b030 95691->96085 95693 40f19c 96089 41a1d0 95693->96089 95697 40f1c2 95700 40f1ed 95697->95700 96095 41a250 95697->96095 95699 41a480 2 API calls 95701 409d55 95699->95701 95700->95699 95701->95619 95703 418bbf 95702->95703 95727 414e40 95703->95727 95705 409c93 95706 418a60 95705->95706 95733 41a5f0 95706->95733 95710 41b2b9 95709->95710 95740 414a40 95710->95740 95712 41b2d1 95713 41b2da 95712->95713 95779 41b0e0 95712->95779 95713->95678 95715 41b2ee 95715->95713 95797 419ef0 95715->95797 96055 407ea0 95720->96055 95722 409ac1 95722->95680 95723 409aba 95723->95722 96068 408160 95723->96068 95726->95682 95728 414e5a 95727->95728 95729 414e4e 95727->95729 95728->95705 95729->95728 95732 4152c0 LdrLoadDll 95729->95732 95731 414fac 95731->95705 95732->95731 95735 418a75 95733->95735 95736 41af50 95733->95736 95735->95676 95737 41af82 95736->95737 95738 41af60 95736->95738 95737->95735 95739 414e40 LdrLoadDll 95738->95739 95739->95737 95741 414d75 95740->95741 95742 414a54 95740->95742 95741->95712 95742->95741 95805 419c40 95742->95805 95745 414b6d 95745->95712 95746 414b80 95808 41a350 95746->95808 95747 414b63 95865 41a450 LdrLoadDll 95747->95865 95750 414ba7 95751 41bdb0 2 API calls 95750->95751 95753 414bb3 95751->95753 95752 414d39 95755 41a480 2 API calls 95752->95755 95753->95745 95753->95752 95754 414d4f 95753->95754 95759 414c42 95753->95759 95874 414780 LdrLoadDll NtReadFile NtClose 95754->95874 95756 414d40 95755->95756 95756->95712 95758 414d62 95758->95712 95760 414ca9 95759->95760 95762 414c51 95759->95762 95760->95752 95761 414cbc 95760->95761 95867 41a2d0 95761->95867 95764 414c56 95762->95764 95765 414c6a 95762->95765 95866 414640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 95764->95866 95767 414c87 95765->95767 95768 414c6f 95765->95768 95767->95756 95823 414400 95767->95823 95811 4146e0 95768->95811 95770 414c60 95770->95712 95773 414d1c 95871 41a480 95773->95871 95774 414c7d 95774->95712 95777 414c9f 95777->95712 95778 414d28 95778->95712 95780 41b0f1 95779->95780 95781 41b103 95780->95781 95892 41bd30 95780->95892 95781->95715 95783 41b124 95895 414060 95783->95895 95785 41b170 95785->95715 95786 41b147 95786->95785 95787 414060 3 API calls 95786->95787 95788 41b169 95787->95788 95788->95785 95927 415380 95788->95927 95790 41b1fa 95791 41b20a 95790->95791 96021 41aef0 LdrLoadDll 95790->96021 95937 41ad60 95791->95937 95794 41b238 96016 419eb0 95794->96016 95798 41af50 LdrLoadDll 95797->95798 95799 419f0c 95798->95799 95800 419f27 95799->95800 96049 1982c0a 95799->96049 95802 41bdb0 95800->95802 95803 41b349 95802->95803 96052 41a660 95802->96052 95803->95678 95806 41af50 LdrLoadDll 95805->95806 95807 414b34 95806->95807 95807->95745 95807->95746 95807->95747 95809 41af50 LdrLoadDll 95808->95809 95810 41a36c NtCreateFile 95809->95810 95810->95750 95812 4146fc 95811->95812 95813 41a2d0 LdrLoadDll 95812->95813 95814 41471d 95813->95814 95815 414724 95814->95815 95816 414738 95814->95816 95818 41a480 2 API calls 95815->95818 95817 41a480 2 API calls 95816->95817 95819 414741 95817->95819 95820 41472d 95818->95820 95875 41bfc0 LdrLoadDll RtlAllocateHeap 95819->95875 95820->95774 95822 41474c 95822->95774 95824 41444b 95823->95824 95825 41447e 95823->95825 95826 41a2d0 LdrLoadDll 95824->95826 95827 4145c9 95825->95827 95831 41449a 95825->95831 95828 414466 95826->95828 95829 41a2d0 LdrLoadDll 95827->95829 95830 41a480 2 API calls 95828->95830 95838 4145e4 95829->95838 95833 41446f 95830->95833 95832 41a2d0 LdrLoadDll 95831->95832 95834 4144b5 95832->95834 95833->95777 95836 4144d1 95834->95836 95837 4144bc 95834->95837 95841 4144d6 95836->95841 95842 4144ec 95836->95842 95840 41a480 2 API calls 95837->95840 95888 41a310 LdrLoadDll 95838->95888 95839 41461e 95843 41a480 2 API calls 95839->95843 95844 4144c5 95840->95844 95845 41a480 2 API calls 95841->95845 95851 4144f1 95842->95851 95876 41bf80 95842->95876 95846 414629 95843->95846 95844->95777 95847 4144df 95845->95847 95846->95777 95847->95777 95848 414503 95848->95777 95851->95848 95879 41a400 95851->95879 95852 414557 95856 41456e 95852->95856 95887 41a290 LdrLoadDll 95852->95887 95854 414575 95857 41a480 2 API calls 95854->95857 95855 41458a 95858 41a480 2 API calls 95855->95858 95856->95854 95856->95855 95857->95848 95859 414593 95858->95859 95860 4145bf 95859->95860 95882 41bb80 95859->95882 95860->95777 95862 4145aa 95863 41bdb0 2 API calls 95862->95863 95864 4145b3 95863->95864 95864->95777 95865->95745 95866->95770 95868 41af50 LdrLoadDll 95867->95868 95869 414d04 95868->95869 95870 41a310 LdrLoadDll 95869->95870 95870->95773 95872 41a49c NtClose 95871->95872 95873 41af50 LdrLoadDll 95871->95873 95872->95778 95873->95872 95874->95758 95875->95822 95889 41a620 95876->95889 95878 41bf98 95878->95851 95880 41af50 LdrLoadDll 95879->95880 95881 41a41c NtReadFile 95880->95881 95881->95852 95883 41bba4 95882->95883 95884 41bb8d 95882->95884 95883->95862 95884->95883 95885 41bf80 2 API calls 95884->95885 95886 41bbbb 95885->95886 95886->95862 95887->95856 95888->95839 95890 41af50 LdrLoadDll 95889->95890 95891 41a63c RtlAllocateHeap 95890->95891 95891->95878 96022 41a530 95892->96022 95894 41bd5d 95894->95783 95896 414071 95895->95896 95898 414079 95895->95898 95896->95786 95897 41434c 95897->95786 95898->95897 96025 41cf20 95898->96025 95900 4140cd 95901 41cf20 2 API calls 95900->95901 95905 4140d8 95901->95905 95902 414126 95904 41cf20 2 API calls 95902->95904 95908 41413a 95904->95908 95905->95902 95906 41d050 3 API calls 95905->95906 96036 41cfc0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 95905->96036 95906->95905 95907 414197 95909 41cf20 2 API calls 95907->95909 95908->95907 96030 41d050 95908->96030 95910 4141ad 95909->95910 95912 4141ea 95910->95912 95914 41d050 3 API calls 95910->95914 95913 41cf20 2 API calls 95912->95913 95915 4141f5 95913->95915 95914->95910 95916 41d050 3 API calls 95915->95916 95922 41422f 95915->95922 95916->95915 95918 414324 96038 41cf80 LdrLoadDll RtlFreeHeap 95918->96038 95920 41432e 96039 41cf80 LdrLoadDll RtlFreeHeap 95920->96039 96037 41cf80 LdrLoadDll RtlFreeHeap 95922->96037 95923 414338 96040 41cf80 LdrLoadDll RtlFreeHeap 95923->96040 95925 414342 96041 41cf80 LdrLoadDll RtlFreeHeap 95925->96041 95928 415391 95927->95928 95929 414a40 8 API calls 95928->95929 95931 4153a7 95929->95931 95930 4153fa 95930->95790 95931->95930 95932 4153e2 95931->95932 95933 4153f5 95931->95933 95934 41bdb0 2 API calls 95932->95934 95935 41bdb0 2 API calls 95933->95935 95936 4153e7 95934->95936 95935->95930 95936->95790 95938 41ad74 95937->95938 95939 41ac20 LdrLoadDll 95937->95939 96042 41ac20 95938->96042 95939->95938 95941 41ad7d 95942 41ac20 LdrLoadDll 95941->95942 95943 41ad86 95942->95943 95944 41ac20 LdrLoadDll 95943->95944 95945 41ad8f 95944->95945 95946 41ac20 LdrLoadDll 95945->95946 95947 41ad98 95946->95947 95948 41ac20 LdrLoadDll 95947->95948 95949 41ada1 95948->95949 95950 41ac20 LdrLoadDll 95949->95950 95951 41adad 95950->95951 95952 41ac20 LdrLoadDll 95951->95952 95953 41adb6 95952->95953 95954 41ac20 LdrLoadDll 95953->95954 95955 41adbf 95954->95955 95956 41ac20 LdrLoadDll 95955->95956 95957 41adc8 95956->95957 95958 41ac20 LdrLoadDll 95957->95958 95959 41add1 95958->95959 95960 41ac20 LdrLoadDll 95959->95960 95961 41adda 95960->95961 95962 41ac20 LdrLoadDll 95961->95962 95963 41ade6 95962->95963 95964 41ac20 LdrLoadDll 95963->95964 95965 41adef 95964->95965 95966 41ac20 LdrLoadDll 95965->95966 95967 41adf8 95966->95967 95968 41ac20 LdrLoadDll 95967->95968 95969 41ae01 95968->95969 95970 41ac20 LdrLoadDll 95969->95970 95971 41ae0a 95970->95971 95972 41ac20 LdrLoadDll 95971->95972 95973 41ae13 95972->95973 95974 41ac20 LdrLoadDll 95973->95974 95975 41ae1f 95974->95975 95976 41ac20 LdrLoadDll 95975->95976 95977 41ae28 95976->95977 95978 41ac20 LdrLoadDll 95977->95978 95979 41ae31 95978->95979 95980 41ac20 LdrLoadDll 95979->95980 95981 41ae3a 95980->95981 95982 41ac20 LdrLoadDll 95981->95982 95983 41ae43 95982->95983 95984 41ac20 LdrLoadDll 95983->95984 95985 41ae4c 95984->95985 95986 41ac20 LdrLoadDll 95985->95986 95987 41ae58 95986->95987 95988 41ac20 LdrLoadDll 95987->95988 95989 41ae61 95988->95989 95990 41ac20 LdrLoadDll 95989->95990 95991 41ae6a 95990->95991 95992 41ac20 LdrLoadDll 95991->95992 95993 41ae73 95992->95993 95994 41ac20 LdrLoadDll 95993->95994 95995 41ae7c 95994->95995 95996 41ac20 LdrLoadDll 95995->95996 95997 41ae85 95996->95997 95998 41ac20 LdrLoadDll 95997->95998 95999 41ae91 95998->95999 96000 41ac20 LdrLoadDll 95999->96000 96001 41ae9a 96000->96001 96002 41ac20 LdrLoadDll 96001->96002 96003 41aea3 96002->96003 96004 41ac20 LdrLoadDll 96003->96004 96005 41aeac 96004->96005 96006 41ac20 LdrLoadDll 96005->96006 96007 41aeb5 96006->96007 96008 41ac20 LdrLoadDll 96007->96008 96009 41aebe 96008->96009 96010 41ac20 LdrLoadDll 96009->96010 96011 41aeca 96010->96011 96012 41ac20 LdrLoadDll 96011->96012 96013 41aed3 96012->96013 96014 41ac20 LdrLoadDll 96013->96014 96015 41aedc 96014->96015 96015->95794 96017 41af50 LdrLoadDll 96016->96017 96018 419ecc 96017->96018 96048 1982df0 LdrInitializeThunk 96018->96048 96019 419ee3 96019->95715 96021->95791 96023 41a54c NtAllocateVirtualMemory 96022->96023 96024 41af50 LdrLoadDll 96022->96024 96023->95894 96024->96023 96026 41cf30 96025->96026 96027 41cf36 96025->96027 96026->95900 96028 41bf80 2 API calls 96027->96028 96029 41cf5c 96028->96029 96029->95900 96031 41cfc0 96030->96031 96032 41d01d 96031->96032 96033 41bf80 2 API calls 96031->96033 96032->95908 96034 41cffa 96033->96034 96035 41bdb0 2 API calls 96034->96035 96035->96032 96036->95905 96037->95918 96038->95920 96039->95923 96040->95925 96041->95897 96043 41ac3b 96042->96043 96044 414e40 LdrLoadDll 96043->96044 96045 41ac5b 96044->96045 96046 414e40 LdrLoadDll 96045->96046 96047 41ad07 96045->96047 96046->96047 96047->95941 96047->96047 96048->96019 96050 1982c1f LdrInitializeThunk 96049->96050 96051 1982c11 96049->96051 96050->95800 96051->95800 96053 41af50 LdrLoadDll 96052->96053 96054 41a67c RtlFreeHeap 96053->96054 96054->95803 96056 407eb0 96055->96056 96057 407eab 96055->96057 96058 41bd30 2 API calls 96056->96058 96057->95723 96061 407ed5 96058->96061 96059 407f38 96059->95723 96060 419eb0 2 API calls 96060->96061 96061->96059 96061->96060 96062 407f3e 96061->96062 96066 41bd30 2 API calls 96061->96066 96071 41a5b0 96061->96071 96064 407f64 96062->96064 96065 41a5b0 2 API calls 96062->96065 96064->95723 96067 407f55 96065->96067 96066->96061 96067->95723 96069 40817e 96068->96069 96070 41a5b0 2 API calls 96068->96070 96069->95680 96070->96069 96072 41a5cc 96071->96072 96073 41af50 LdrLoadDll 96071->96073 96076 1982c70 LdrInitializeThunk 96072->96076 96073->96072 96074 41a5e3 96074->96061 96076->96074 96078 41b5b3 96077->96078 96081 40ace0 96078->96081 96082 40ad04 96081->96082 96083 40ad40 LdrLoadDll 96082->96083 96084 409c3a 96082->96084 96083->96084 96084->95686 96086 40b053 96085->96086 96088 40b0d0 96086->96088 96100 419c80 LdrLoadDll 96086->96100 96088->95693 96090 41af50 LdrLoadDll 96089->96090 96091 40f1ab 96090->96091 96091->95701 96092 41a7c0 96091->96092 96093 41af50 LdrLoadDll 96092->96093 96094 41a7df LookupPrivilegeValueW 96093->96094 96094->95697 96096 41af50 LdrLoadDll 96095->96096 96097 41a26c 96096->96097 96101 1982ea0 LdrInitializeThunk 96097->96101 96098 41a28b 96098->95700 96100->96088 96101->96098 96103 40b1b9 96102->96103 96104 40b030 LdrLoadDll 96103->96104 96105 40b1f4 96104->96105 96105->95635 96107 40ae41 96106->96107 96108 40ae3d 96106->96108 96109 40ae8c 96107->96109 96110 40ae5a 96107->96110 96108->95638 96153 419cc0 LdrLoadDll 96109->96153 96152 419cc0 LdrLoadDll 96110->96152 96112 40ae9d 96112->95638 96114 40ae7c 96114->95638 96116 40f490 3 API calls 96115->96116 96117 4143b6 96115->96117 96116->96117 96117->95640 96154 4087a0 96118->96154 96121 4087a0 19 API calls 96122 408a8a 96121->96122 96124 408a9d 96122->96124 96172 40f700 10 API calls 96122->96172 96124->95642 96126 41af50 LdrLoadDll 96125->96126 96127 41a50c 96126->96127 96291 1982e80 LdrInitializeThunk 96127->96291 96128 40c312 96130 40f490 96128->96130 96131 40f4ad 96130->96131 96292 419fb0 96131->96292 96134 40f4f5 96134->95646 96135 41a000 2 API calls 96136 40f51e 96135->96136 96136->95646 96138 41af50 LdrLoadDll 96137->96138 96139 41a01c 96138->96139 96298 1982d10 LdrInitializeThunk 96139->96298 96140 40c375 96140->95652 96140->95655 96143 41af50 LdrLoadDll 96142->96143 96144 41a06c 96143->96144 96299 1982d30 LdrInitializeThunk 96144->96299 96145 40c449 96145->95663 96148 41af50 LdrLoadDll 96147->96148 96149 419e2c 96148->96149 96300 1982fb0 LdrInitializeThunk 96149->96300 96150 40c49c 96150->95667 96152->96114 96153->96112 96155 407ea0 4 API calls 96154->96155 96170 4087ba 96154->96170 96155->96170 96156 408a49 96156->96121 96156->96124 96157 408a3f 96158 408160 2 API calls 96157->96158 96158->96156 96161 419ef0 2 API calls 96161->96170 96163 41a480 LdrLoadDll NtClose 96163->96170 96166 40c4b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 96166->96170 96169 419e10 2 API calls 96169->96170 96170->96156 96170->96157 96170->96161 96170->96163 96170->96166 96170->96169 96173 419d00 96170->96173 96176 4085d0 96170->96176 96188 40f5e0 LdrLoadDll NtClose 96170->96188 96189 419d80 LdrLoadDll 96170->96189 96190 419db0 LdrLoadDll 96170->96190 96191 419e40 LdrLoadDll 96170->96191 96192 4083a0 96170->96192 96208 405f60 LdrLoadDll 96170->96208 96172->96124 96174 41af50 LdrLoadDll 96173->96174 96175 419d1c 96174->96175 96175->96170 96177 4085e6 96176->96177 96209 419870 96177->96209 96179 4085ff 96184 408771 96179->96184 96230 4081a0 96179->96230 96181 4086e5 96182 4083a0 11 API calls 96181->96182 96181->96184 96183 408713 96182->96183 96183->96184 96185 419ef0 2 API calls 96183->96185 96184->96170 96186 408748 96185->96186 96186->96184 96187 41a4f0 2 API calls 96186->96187 96187->96184 96188->96170 96189->96170 96190->96170 96191->96170 96193 4083c9 96192->96193 96270 408310 96193->96270 96196 41a4f0 2 API calls 96197 4083dc 96196->96197 96197->96196 96198 408467 96197->96198 96201 408462 96197->96201 96278 40f660 96197->96278 96198->96170 96199 41a480 2 API calls 96200 40849a 96199->96200 96200->96198 96202 419d00 LdrLoadDll 96200->96202 96201->96199 96203 4084ff 96202->96203 96203->96198 96282 419d40 96203->96282 96205 408563 96205->96198 96206 414a40 8 API calls 96205->96206 96207 4085b8 96206->96207 96207->96170 96208->96170 96210 41bf80 2 API calls 96209->96210 96211 419887 96210->96211 96237 409310 96211->96237 96213 4198a2 96214 4198e0 96213->96214 96215 4198c9 96213->96215 96218 41bd30 2 API calls 96214->96218 96216 41bdb0 2 API calls 96215->96216 96217 4198d6 96216->96217 96217->96179 96219 41991a 96218->96219 96220 41bd30 2 API calls 96219->96220 96221 419933 96220->96221 96227 419bd4 96221->96227 96243 41bd70 96221->96243 96224 419bc0 96225 41bdb0 2 API calls 96224->96225 96226 419bca 96225->96226 96226->96179 96228 41bdb0 2 API calls 96227->96228 96229 419c29 96228->96229 96229->96179 96231 40829f 96230->96231 96232 4081b5 96230->96232 96231->96181 96232->96231 96233 414a40 8 API calls 96232->96233 96234 408222 96233->96234 96235 41bdb0 2 API calls 96234->96235 96236 408249 96234->96236 96235->96236 96236->96181 96238 409335 96237->96238 96239 40ace0 LdrLoadDll 96238->96239 96240 409368 96239->96240 96242 40938d 96240->96242 96246 40cf10 96240->96246 96242->96213 96264 41a570 96243->96264 96247 40cf11 96246->96247 96248 41a1d0 LdrLoadDll 96247->96248 96249 40cf55 96248->96249 96250 40cf5c 96249->96250 96257 41a210 96249->96257 96250->96242 96254 40cf97 96255 41a480 2 API calls 96254->96255 96256 40cfba 96255->96256 96256->96242 96258 41a22c 96257->96258 96259 41af50 LdrLoadDll 96257->96259 96263 1982ca0 LdrInitializeThunk 96258->96263 96259->96258 96260 40cf7f 96260->96250 96262 41a800 LdrLoadDll 96260->96262 96262->96254 96263->96260 96265 41af50 LdrLoadDll 96264->96265 96266 41a58c 96265->96266 96269 1982f90 LdrInitializeThunk 96266->96269 96267 419bb9 96267->96224 96267->96227 96269->96267 96271 408328 96270->96271 96272 40ace0 LdrLoadDll 96271->96272 96273 408343 96272->96273 96274 414e40 LdrLoadDll 96273->96274 96275 408353 96274->96275 96276 40835c PostThreadMessageW 96275->96276 96277 408370 96275->96277 96276->96277 96277->96197 96279 40f673 96278->96279 96285 419e80 96279->96285 96283 41af50 LdrLoadDll 96282->96283 96284 419d5c 96283->96284 96284->96205 96286 419e9c 96285->96286 96287 41af50 LdrLoadDll 96285->96287 96290 1982dd0 LdrInitializeThunk 96286->96290 96287->96286 96288 40f69e 96288->96197 96290->96288 96291->96128 96293 41af50 LdrLoadDll 96292->96293 96294 419fcc 96293->96294 96297 1982f30 LdrInitializeThunk 96294->96297 96295 40f4ee 96295->96134 96295->96135 96297->96295 96298->96140 96299->96145 96300->96150 96301 1982ad0 LdrInitializeThunk

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 41a400-41a449 call 41af50 NtReadFile
                                                                                          APIs
                                                                                          • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A445
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FileRead
                                                                                          • String ID: !JA$bMA$bMA
                                                                                          • API String ID: 2738559852-4222312340
                                                                                          • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                          • Instruction ID: 27817754ac388b25b847a3362b671b2e44b934df7eae6808a762aa4d31f9cf83
                                                                                          • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                          • Instruction Fuzzy Hash: 93F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 244 40ace0-40ad09 call 41cc40 247 40ad0b-40ad0e 244->247 248 40ad0f-40ad1d call 41d060 244->248 251 40ad2d-40ad3e call 41b490 248->251 252 40ad1f-40ad2a call 41d2e0 248->252 257 40ad40-40ad54 LdrLoadDll 251->257 258 40ad57-40ad5a 251->258 252->251 257->258
                                                                                          APIs
                                                                                          • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Load
                                                                                          • String ID:
                                                                                          • API String ID: 2234796835-0
                                                                                          • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                          • Instruction ID: d499f532a4605d4acc668fd39ab8700ce4e6b27de0f8ef54b1fb0fb48fae0bb4
                                                                                          • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                          • Instruction Fuzzy Hash: EF0152B5D4020DA7DB10EBA5DC42FDEB3789F14308F0041A5E908A7281F634EB54CB95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 259 41a350-41a3a1 call 41af50 NtCreateFile
                                                                                          APIs
                                                                                          • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                          • Instruction ID: 880687b14e2bfdcefdfb108c829fe1d34a34742feba638e3287dae326a4d6923
                                                                                          • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                          • Instruction Fuzzy Hash: AAF0BDB2201208AFCB08CF89DC85EEB77ADAF8C754F158248BA1D97241C630E8518BA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 262 41a52a-41a56d call 41af50 NtAllocateVirtualMemory
                                                                                          APIs
                                                                                          • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateMemoryVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2167126740-0
                                                                                          • Opcode ID: 228644025f840f7fee6e35e43d606d2cd65501fa599a09edf95dbb4ed57bdd68
                                                                                          • Instruction ID: 5ffd9728610d5dd4d37788f4d0a412f800f0528348d8b23841a4b3b5204e8e6b
                                                                                          • Opcode Fuzzy Hash: 228644025f840f7fee6e35e43d606d2cd65501fa599a09edf95dbb4ed57bdd68
                                                                                          • Instruction Fuzzy Hash: 52F058B1200208ABCB18DF88CC91EE737ACAF88314F108148BE0C97252C630E810CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 265 41a530-41a546 266 41a54c-41a56d NtAllocateVirtualMemory 265->266 267 41a547 call 41af50 265->267 267->266
                                                                                          APIs
                                                                                          • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateMemoryVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2167126740-0
                                                                                          • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                          • Instruction ID: 4e0f78fd3c2c10b6dba7ecb12144fed22081eaa1fb7babd41561f41a61d0d9a2
                                                                                          • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                          • Instruction Fuzzy Hash: A3F015B2200208AFCB14DF89CC81EEB77ADAF88754F118149BE1C97241C630F811CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 278 41a47c-41a4a9 call 41af50 NtClose
                                                                                          APIs
                                                                                          • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A4A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close
                                                                                          • String ID:
                                                                                          • API String ID: 3535843008-0
                                                                                          • Opcode ID: 2a6e77dc6e63fa20358b6d1967c4757a1df7cb8c207af33ae23075fd2ab79126
                                                                                          • Instruction ID: 74f325f6456e40746026e1435586509bfe7f73128666eae7e8e5cd7dfe80f1a7
                                                                                          • Opcode Fuzzy Hash: 2a6e77dc6e63fa20358b6d1967c4757a1df7cb8c207af33ae23075fd2ab79126
                                                                                          • Instruction Fuzzy Hash: 2EE012762402146FD714EBD4CC45FD77768EF44764F154499BA2C9B242C534E61087D0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A4A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close
                                                                                          • String ID:
                                                                                          • API String ID: 3535843008-0
                                                                                          • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                          • Instruction ID: 58703de6d0d09b45194c1a78dafb6a6614d70e6a8447524affba2eb7b0ba4c9c
                                                                                          • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                          • Instruction Fuzzy Hash: E9D01776200214ABD710EB99CC85EE77BACEF48764F154499BA1C9B242C530FA1086E4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: cb6eb0cd2d4c7c21fb9f76e72d20f46b5ddb28255b046133fab3c58728bb6026
                                                                                          • Instruction ID: 1419f28ccbf0100097e0335b88da76228feee71edd06940f15515562471adea6
                                                                                          • Opcode Fuzzy Hash: cb6eb0cd2d4c7c21fb9f76e72d20f46b5ddb28255b046133fab3c58728bb6026
                                                                                          • Instruction Fuzzy Hash: 6E90023120250C02D680715C440864A404997D2301F95C019A0069654DCA1A8B5977A5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: bc3d688c0b955a063a5969feb3018bfcb8362d47620c2c3c4fea9c0641ccdcde
                                                                                          • Instruction ID: afa99401afe53eef8c3d5ae555dc654668b1ce990bd3b89390feeba8c3b4adc4
                                                                                          • Opcode Fuzzy Hash: bc3d688c0b955a063a5969feb3018bfcb8362d47620c2c3c4fea9c0641ccdcde
                                                                                          • Instruction Fuzzy Hash: 31900261203504034605715C4418616804E97E1201B55C025E1058590DC52A89916229
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 6b80217fd712f9756393a85653a4f55b4adf13546f63082962f0d27da9a967dc
                                                                                          • Instruction ID: 0192c98f9a5761d19a16dd8771b7ce85b645779d660877fbb82bdc08eddf560e
                                                                                          • Opcode Fuzzy Hash: 6b80217fd712f9756393a85653a4f55b4adf13546f63082962f0d27da9a967dc
                                                                                          • Instruction Fuzzy Hash: 05900225212504030605B55C0708507408A97D6351355C025F1059550CD62689615225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 637488612ba3ae66fe4e20e74ca439c2cb0a572ad65818e84d1ec3e357b943bb
                                                                                          • Instruction ID: 58d03e9c751a5d37823052b02246a3a833ffbf8a1a21f8b62a3abf943e281b4a
                                                                                          • Opcode Fuzzy Hash: 637488612ba3ae66fe4e20e74ca439c2cb0a572ad65818e84d1ec3e357b943bb
                                                                                          • Instruction Fuzzy Hash: 8D900221243545525A45B15C4408507804AA7E1241795C016A1458950CC52B9956D725
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2e4b8ebbe464968644c401eeaf8dd560f5baa1b40674d0ac2a130cd0aee7c856
                                                                                          • Instruction ID: 5e94db89906ec16af423fb82357e47a7ea0950bec20c1afcf252967b32f43ebe
                                                                                          • Opcode Fuzzy Hash: 2e4b8ebbe464968644c401eeaf8dd560f5baa1b40674d0ac2a130cd0aee7c856
                                                                                          • Instruction Fuzzy Hash: 8390023120250813D611715C4508707404D97D1241F95C416A0468558DD65B8A52A225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 09eebc48a708453c5f923e69f4ed8361d7cc4fe9c3f1b0a99ba4f6e928761dd2
                                                                                          • Instruction ID: 1f839154bd7e5149d5ef44955bf594d2bc03a9e345e42147b5bce28a8ba189d7
                                                                                          • Opcode Fuzzy Hash: 09eebc48a708453c5f923e69f4ed8361d7cc4fe9c3f1b0a99ba4f6e928761dd2
                                                                                          • Instruction Fuzzy Hash: 2090022921350402D680715C540C60A404997D2202F95D419A0059558CC91A89695325
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 304771c5e256cabdc666a827c001688df6b96b7538684f53c6b0ab5ddbe85d1f
                                                                                          • Instruction ID: 3067bbce087b589abfc1377a82300c94b30870b1ceaee3bd65c05b1f312eb75c
                                                                                          • Opcode Fuzzy Hash: 304771c5e256cabdc666a827c001688df6b96b7538684f53c6b0ab5ddbe85d1f
                                                                                          • Instruction Fuzzy Hash: FA90022130250403D640715C541C6068049E7E2301F55D015E0458554CD91A89565326
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 7c785581f12fd7429fb8142cbca86edf2c1020aec359d35507fd9f285c5c3f17
                                                                                          • Instruction ID: 93f5d6aceea0bb1ff89ac5979a677a535db77512912dc15d32491d468e801c1e
                                                                                          • Opcode Fuzzy Hash: 7c785581f12fd7429fb8142cbca86edf2c1020aec359d35507fd9f285c5c3f17
                                                                                          • Instruction Fuzzy Hash: 9190023120250802D600759C540C646404997E1301F55D015A5068555EC66A89916235
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2f6cd40fa9eef01796a1927e0609b4ba8c3dba1c62f70be6431c80a14f9d26f6
                                                                                          • Instruction ID: b0df72744652b7c31aaf92622abfe7fb6aebb94900d9c1cf9ab1b118f9517fe9
                                                                                          • Opcode Fuzzy Hash: 2f6cd40fa9eef01796a1927e0609b4ba8c3dba1c62f70be6431c80a14f9d26f6
                                                                                          • Instruction Fuzzy Hash: C390023120258C02D610715C840874A404997D1301F59C415A4468658DC69A89917225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: c372fee35af2ccd65f3d0fb328e2ec5f874b99fa85adf9e470268617f8bbc970
                                                                                          • Instruction ID: 008c5f01bbfbb33a4df3e95c4e5683b95f9e544f545744f63d24427533edbfea
                                                                                          • Opcode Fuzzy Hash: c372fee35af2ccd65f3d0fb328e2ec5f874b99fa85adf9e470268617f8bbc970
                                                                                          • Instruction Fuzzy Hash: 9B90023120290802D600715C481870B404997D1302F55C015A11A8555DC62A89516675
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 8636f520a54791ee73c4a40baf2075f01ab8adb761dfb4940a6eef6badf36da7
                                                                                          • Instruction ID: c68ca02023b61e0d1b4f1d18de9bf36804055bb76274ba00699a1a86842fa205
                                                                                          • Opcode Fuzzy Hash: 8636f520a54791ee73c4a40baf2075f01ab8adb761dfb4940a6eef6badf36da7
                                                                                          • Instruction Fuzzy Hash: 19900221602504424640716C88489068049BBE2211755C125A09DC550DC55E89655769
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 9dd0a27983a86130cd47536b795e0a2ac00ad1c4adb5ec9ae2e320c8d59c60d4
                                                                                          • Instruction ID: 2f61f581e35051fd9a90e234fdef191266dcb4e28edd6d83bad6f492bfc956cb
                                                                                          • Opcode Fuzzy Hash: 9dd0a27983a86130cd47536b795e0a2ac00ad1c4adb5ec9ae2e320c8d59c60d4
                                                                                          • Instruction Fuzzy Hash: F6900221212D0442D700756C4C18B07404997D1303F55C119A0198554CC91A89615625
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 9c574972f68f37948f2cc0ca12d619d223d9997ef6cc17a50e1b78ad3de013e8
                                                                                          • Instruction ID: 9bc044dd39fa6b5999f90547b991fd07408f4ee099c011c45441289514f60d16
                                                                                          • Opcode Fuzzy Hash: 9c574972f68f37948f2cc0ca12d619d223d9997ef6cc17a50e1b78ad3de013e8
                                                                                          • Instruction Fuzzy Hash: EE90026134250842D600715C4418B064049D7E2301F55C019E10A8554DC61ECD52622A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 9bee59e6a14efba33c6594ff4c859080ebc56f0218d4edc77c9d36f1d9ee3de9
                                                                                          • Instruction ID: 3c6c38a2ad735bc68576ce30af4bdf09efd06217e143e984e4c6dac3cae28ddd
                                                                                          • Opcode Fuzzy Hash: 9bee59e6a14efba33c6594ff4c859080ebc56f0218d4edc77c9d36f1d9ee3de9
                                                                                          • Instruction Fuzzy Hash: A890022160250902D601715C4408616404E97D1241F95C026A1068555ECA2A8A92A235
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: a2ed54bda7ad3036af9b7dd3a905d2dc029a7e8291b9150a1af1fdc57520187e
                                                                                          • Instruction ID: 60674abf1b9a36a5d4855f5019013d04af9acda2b6c803c33c36bfdcce84870d
                                                                                          • Opcode Fuzzy Hash: a2ed54bda7ad3036af9b7dd3a905d2dc029a7e8291b9150a1af1fdc57520187e
                                                                                          • Instruction Fuzzy Hash: 4E90027120250802D640715C4408746404997D1301F55C015A50A8554EC65E8ED56769
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                                                                          • Instruction ID: 290ea537485be02d779a264d5a339eceb4dab98af215cfaa17b5abd8430697b8
                                                                                          • Opcode Fuzzy Hash: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                                                                          • Instruction Fuzzy Hash: FD213AB2D442095BCB21D664AD42BFF73BCAB54314F04007FE949A3182F638BF498BA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A64D
                                                                                          • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6C8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateExitHeapProcess
                                                                                          • String ID: &EA
                                                                                          • API String ID: 1054155344-1330915590
                                                                                          • Opcode ID: 74718f39f73767e11d61d1e7c1d9dd5e3dec8e3c8a46534d5e077441bd196523
                                                                                          • Instruction ID: 3442741909fd3ae836a7a9b636d4f3a5158cea82ca9ee53051834243c9db8715
                                                                                          • Opcode Fuzzy Hash: 74718f39f73767e11d61d1e7c1d9dd5e3dec8e3c8a46534d5e077441bd196523
                                                                                          • Instruction Fuzzy Hash: B4119DB5204248AFCB14EFA8DC80DEB77A8AF88314F15864DF95C97242C634E916CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 13 41a620-41a651 call 41af50 RtlAllocateHeap
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A64D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID: &EA
                                                                                          • API String ID: 1279760036-1330915590
                                                                                          • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                          • Instruction ID: 51260f1f489a67c7b9949974b81657d9e18ee3442a924465d5a53260c52aa3af
                                                                                          • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                          • Instruction Fuzzy Hash: AFE012B1200208ABDB14EF99CC41EA777ACAF88664F118559BA1C5B242C630F9118AB4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 211 40830a-40830c 212 408295-40829e 211->212 213 40830e-40835a call 41be50 call 41c9f0 call 40ace0 call 414e40 211->213 223 40835c-40836e PostThreadMessageW 213->223 224 40838e-408392 213->224 225 408370-40838a call 40a470 223->225 226 40838d 223->226 225->226 226->224
                                                                                          APIs
                                                                                          • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessagePostThread
                                                                                          • String ID:
                                                                                          • API String ID: 1836367815-0
                                                                                          • Opcode ID: c9fa9b717a73b89cfc8cb1096402c616e658baaf3a741ba5bf89e6e5482e68be
                                                                                          • Instruction ID: 824987672ed01c09ee9b66fcdf58cf4c3352d779d31f09e622c7ebf533d05529
                                                                                          • Opcode Fuzzy Hash: c9fa9b717a73b89cfc8cb1096402c616e658baaf3a741ba5bf89e6e5482e68be
                                                                                          • Instruction Fuzzy Hash: 6B014931A8031876E720A6A59C03FFE775CAB40B54F05026EFF04FA1C1EAA9690542EA
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 229 408310-40831f 230 408328-40835a call 41c9f0 call 40ace0 call 414e40 229->230 231 408323 call 41be50 229->231 238 40835c-40836e PostThreadMessageW 230->238 239 40838e-408392 230->239 231->230 240 408370-40838a call 40a470 238->240 241 40838d 238->241 240->241 241->239
                                                                                          APIs
                                                                                          • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessagePostThread
                                                                                          • String ID:
                                                                                          • API String ID: 1836367815-0
                                                                                          • Opcode ID: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                                                                          • Instruction ID: d17f8cfce065c66642409dfa920775f821b8147089a61b374e72855f6ed3688e
                                                                                          • Opcode Fuzzy Hash: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                                                                          • Instruction Fuzzy Hash: E0018471A8032877E720A6959C43FFE776C6B40F54F05412AFF04BA1C2E6A8690546EA
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 268 41a7b1-41a7d9 270 41a7df-41a7f4 LookupPrivilegeValueW 268->270 271 41a7da call 41af50 268->271 271->270
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 3dd8dddf95c5932f6aa1323c090e32eb977d90218e8a7b8369b87a08571e4ed2
                                                                                          • Instruction ID: 01149328ab3043017a633e6cc8b1acc7fa4ac83b83ee51ed52c87f83440faf0c
                                                                                          • Opcode Fuzzy Hash: 3dd8dddf95c5932f6aa1323c090e32eb977d90218e8a7b8369b87a08571e4ed2
                                                                                          • Instruction Fuzzy Hash: DFF0E5B4604240AFC710DF54C845DD73BA8EF80314F00456EFC695B242C735D415CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 272 41a660-41a691 call 41af50 RtlFreeHeap
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A68D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID:
                                                                                          • API String ID: 3298025750-0
                                                                                          • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                          • Instruction ID: bc8b067cd83da56cee666b5c28ce04d4f8bf1b8054c0557e0bc192b3240f86e0
                                                                                          • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                          • Instruction Fuzzy Hash: DAE012B1200208ABDB18EF99CC49EA777ACAF88764F018559BA1C5B242C630E9108AB4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 275 41a7c0-41a7f4 call 41af50 LookupPrivilegeValueW
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                          • Instruction ID: b271a6b6fd8fca1a6df64550df1cef4b538e167436523c48f1a9ef262b7a55b1
                                                                                          • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                          • Instruction Fuzzy Hash: 4FE01AB12002086BDB10DF49CC85EE737ADAF88654F018155BA0C57241C934E8118BF5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6C8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExitProcess
                                                                                          • String ID:
                                                                                          • API String ID: 621844428-0
                                                                                          • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                          • Instruction ID: 02052f1feec4c32fa888e0c2ff15824475a9bddcc7bd9f2d7c69f560d23a1846
                                                                                          • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                          • Instruction Fuzzy Hash: CBD017726002187BD620EB99CC85FD777ACDF487A4F0180A9BA1C6B242C531BA108AE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 027d32178a0435ad0977e20b44132e86b8b26ddd25450598ed125531e22185e0
                                                                                          • Instruction ID: 5b0f52081c4d4733fb751602980a9f034584b4b957fee93a443d428cd56d2348
                                                                                          • Opcode Fuzzy Hash: 027d32178a0435ad0977e20b44132e86b8b26ddd25450598ed125531e22185e0
                                                                                          • Instruction Fuzzy Hash: 6AB09B71D025C5C5DF11F764460C717794477D1701F15C065D2074645F473DC1D1E275
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-2160512332
                                                                                          • Opcode ID: cd3730a9dedb308a7feed1020f2b3b8ffec4669f255f8c5db433e2d51fcfda24
                                                                                          • Instruction ID: 8cb89c777717e6a5040f1703828ca19638e8baefdbdddfe89c32c5496ecd0276
                                                                                          • Opcode Fuzzy Hash: cd3730a9dedb308a7feed1020f2b3b8ffec4669f255f8c5db433e2d51fcfda24
                                                                                          • Instruction Fuzzy Hash: A2924B71608342AFE721DF29C880B6BB7E8BB84B54F14492DFA98D7251D770E944CB93
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • Critical section debug info address, xrefs: 019B541F, 019B552E
                                                                                          • Thread identifier, xrefs: 019B553A
                                                                                          • undeleted critical section in freed memory, xrefs: 019B542B
                                                                                          • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 019B54E2
                                                                                          • Address of the debug info found in the active list., xrefs: 019B54AE, 019B54FA
                                                                                          • 8, xrefs: 019B52E3
                                                                                          • Critical section address., xrefs: 019B5502
                                                                                          • Thread is in a state in which it cannot own a critical section, xrefs: 019B5543
                                                                                          • Critical section address, xrefs: 019B5425, 019B54BC, 019B5534
                                                                                          • Invalid debug info address of this critical section, xrefs: 019B54B6
                                                                                          • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 019B54CE
                                                                                          • double initialized or corrupted critical section, xrefs: 019B5508
                                                                                          • corrupted critical section, xrefs: 019B54C2
                                                                                          • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 019B540A, 019B5496, 019B5519
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                                          • API String ID: 0-2368682639
                                                                                          • Opcode ID: 29b9a771af36ff33b00e2f5e763928a648a4693497738b802508e7196d6b38b4
                                                                                          • Instruction ID: f59bd7c4582975ed92c72bade9d7d67511cee92293280a04c94f0ab80f5adafa
                                                                                          • Opcode Fuzzy Hash: 29b9a771af36ff33b00e2f5e763928a648a4693497738b802508e7196d6b38b4
                                                                                          • Instruction Fuzzy Hash: D0817AB0A01358AFEB20CF99C985FAEBBF9BB88B15F114159F50CB7250D3B5A941CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 019B2624
                                                                                          • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 019B2412
                                                                                          • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 019B2409
                                                                                          • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 019B24C0
                                                                                          • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 019B2498
                                                                                          • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 019B22E4
                                                                                          • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 019B2506
                                                                                          • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 019B2602
                                                                                          • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 019B25EB
                                                                                          • RtlpResolveAssemblyStorageMapEntry, xrefs: 019B261F
                                                                                          • @, xrefs: 019B259B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                                          • API String ID: 0-4009184096
                                                                                          • Opcode ID: 7050ef8442b7dd724dd0fe2527fe9cf9e9ee87e488ad3364b8a2367cc5bd6726
                                                                                          • Instruction ID: 92f2236fbbb79d4d360f87147869a8be30c8f08248d345b77801587a391a4517
                                                                                          • Opcode Fuzzy Hash: 7050ef8442b7dd724dd0fe2527fe9cf9e9ee87e488ad3364b8a2367cc5bd6726
                                                                                          • Instruction Fuzzy Hash: 9E027EB1D002299BDB31DB54CD80BEAB7B8AF54704F0445EAE64DA7241EB70AF84CF59
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                                          • API String ID: 0-2515994595
                                                                                          • Opcode ID: ec7417fccb309d1ad2d6256e0175612ee4fe1c35c70e1537c7814972c4f9c92c
                                                                                          • Instruction ID: 6c1dc1d0e688de99cc78344f240f185c9e5bd499b7457d469b8c89b5c485de08
                                                                                          • Opcode Fuzzy Hash: ec7417fccb309d1ad2d6256e0175612ee4fe1c35c70e1537c7814972c4f9c92c
                                                                                          • Instruction Fuzzy Hash: 5851BF715043069BD32ADF98C888BABBBECEFD5640F14492DA95D83245E770D684CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                                          • API String ID: 0-1700792311
                                                                                          • Opcode ID: 1d0e617ef22ee361c4d5e0069fd73ea59491d78a7c97cc2de88c0ccc88ce2c55
                                                                                          • Instruction ID: 0fe8e6b005704623f7d012b434b726cd1e2e6fbb7d69ac49b652b8f93b5e2c41
                                                                                          • Opcode Fuzzy Hash: 1d0e617ef22ee361c4d5e0069fd73ea59491d78a7c97cc2de88c0ccc88ce2c55
                                                                                          • Instruction Fuzzy Hash: D0D1EF35600685EFDB22DF69C801AA9BBFAFF89715F09804DF64D9B252D734D981CB10
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • AVRF: -*- final list of providers -*- , xrefs: 019C8B8F
                                                                                          • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 019C8A67
                                                                                          • VerifierDlls, xrefs: 019C8CBD
                                                                                          • VerifierDebug, xrefs: 019C8CA5
                                                                                          • VerifierFlags, xrefs: 019C8C50
                                                                                          • HandleTraces, xrefs: 019C8C8F
                                                                                          • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 019C8A3D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                                          • API String ID: 0-3223716464
                                                                                          • Opcode ID: 60817963478844a02cf1958375b65d7aca264e620c676542a10c9d4262d140db
                                                                                          • Instruction ID: 1ec64fba8b2e8d9dc439b784c4aa52c8413a683a6499b28523f2c81c5aee6f50
                                                                                          • Opcode Fuzzy Hash: 60817963478844a02cf1958375b65d7aca264e620c676542a10c9d4262d140db
                                                                                          • Instruction Fuzzy Hash: 2E91F2B1A41716AFD721DF6CD880F5A7BA8ABD4F14F05082CFA8D6B244C770AD01CB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                                          • API String ID: 0-1109411897
                                                                                          • Opcode ID: a42fb4fd5549614875b4e252be6bbe3c2217ff86f09e9a3d4aec93651bf5ac38
                                                                                          • Instruction ID: e7d02a75a9758377cdd10d633e5d3dc2fdef89ba3d85b210050c293e44af518f
                                                                                          • Opcode Fuzzy Hash: a42fb4fd5549614875b4e252be6bbe3c2217ff86f09e9a3d4aec93651bf5ac38
                                                                                          • Instruction Fuzzy Hash: 26A26870E0562A8FDB64CF18CC88BA9BBB5BF89705F5442E9D90DA7250DB749E84CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-792281065
                                                                                          • Opcode ID: 87dca22ece9a59b2550f97d14bb9d6919d73a53b859edcade862ffc72fda43ed
                                                                                          • Instruction ID: 8a194ece3d4de41b333b8f4e2f7a5b87996a2832fea06b3a84af365a9bb0e240
                                                                                          • Opcode Fuzzy Hash: 87dca22ece9a59b2550f97d14bb9d6919d73a53b859edcade862ffc72fda43ed
                                                                                          • Instruction Fuzzy Hash: E8913730F04715EBFB25DF58DD84BEA7BA9BF91B24F000129E50D6B286D7749802D791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 019999ED
                                                                                          • LdrpInitShimEngine, xrefs: 019999F4, 01999A07, 01999A30
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 01999A11, 01999A3A
                                                                                          • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01999A01
                                                                                          • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01999A2A
                                                                                          • apphelp.dll, xrefs: 01936496
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-204845295
                                                                                          • Opcode ID: 40ddb6323570b1a19bf29670b30dad7a7b2d0c8426e48e8661686da03bd8c6f8
                                                                                          • Instruction ID: ab0a350b402af3bb2dc1046fe3a4a588fd06eb77cb8e41e0e754b737fd6f013d
                                                                                          • Opcode Fuzzy Hash: 40ddb6323570b1a19bf29670b30dad7a7b2d0c8426e48e8661686da03bd8c6f8
                                                                                          • Instruction Fuzzy Hash: 46518071608305ABEB25DF28D841FAB7BE9FFC4648F00091DF58D971A4D634EA45CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • minkernel\ntdll\ldrredirect.c, xrefs: 019B8181, 019B81F5
                                                                                          • LdrpInitializeImportRedirection, xrefs: 019B8177, 019B81EB
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 0197C6C3
                                                                                          • Unable to build import redirection Table, Status = 0x%x, xrefs: 019B81E5
                                                                                          • Loading import redirection DLL: '%wZ', xrefs: 019B8170
                                                                                          • LdrpInitializeProcess, xrefs: 0197C6C4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                                          • API String ID: 0-475462383
                                                                                          • Opcode ID: ea8044003515524cb9647086c0893a19f9d11b1c9f1210a137fda9f8ccd3d640
                                                                                          • Instruction ID: ea764fe4f38fe3e067b68167b6160267f75f99d61f8de29df03e62620820e8e4
                                                                                          • Opcode Fuzzy Hash: ea8044003515524cb9647086c0893a19f9d11b1c9f1210a137fda9f8ccd3d640
                                                                                          • Instruction Fuzzy Hash: 3B31F271644307ABC224EF68DD86E6A77D8FFD4B10F04051CF98CAB295E620ED05CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 019B219F
                                                                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 019B21BF
                                                                                          • SXS: %s() passed the empty activation context, xrefs: 019B2165
                                                                                          • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 019B2180
                                                                                          • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 019B2178
                                                                                          • RtlGetAssemblyStorageRoot, xrefs: 019B2160, 019B219A, 019B21BA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                                          • API String ID: 0-861424205
                                                                                          • Opcode ID: 2081ec510071fe228d9571558058928c86d0dcdd046ed9135bd8d0fa0f2ccab4
                                                                                          • Instruction ID: 3886ed3491a10ab646e154eb00e9c9a43d99f6cc655cf7a3667b0a3d12fd58f4
                                                                                          • Opcode Fuzzy Hash: 2081ec510071fe228d9571558058928c86d0dcdd046ed9135bd8d0fa0f2ccab4
                                                                                          • Instruction Fuzzy Hash: 3031E936F402257BF7218B998DC5FAABB79EFA4A50F050059FB0C77245D270AA01C6A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                            • Part of subcall function 01982DF0: LdrInitializeThunk.NTDLL ref: 01982DFA
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01980BA3
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01980BB6
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01980D60
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01980D74
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 1404860816-0
                                                                                          • Opcode ID: 7514136761c2a554b29e07739d21aab689c7ca1ad212b997c3e683cbccc19581
                                                                                          • Instruction ID: 369a7155a3c4b2a271470fc5bf2f38f5af22f6c10a55d6822b7e2011f66a80e4
                                                                                          • Opcode Fuzzy Hash: 7514136761c2a554b29e07739d21aab689c7ca1ad212b997c3e683cbccc19581
                                                                                          • Instruction Fuzzy Hash: 37426CB2900715DFDB61DF28C980BAAB7F8BF44314F1445A9E98DEB242D770A984CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                                          • API String ID: 0-379654539
                                                                                          • Opcode ID: 32b332302b96a39907b6c4c59e785b77f44f415119f85991a0420bfee7017833
                                                                                          • Instruction ID: 446a4967066c8e52600aea194c30a98db43c2d00a685ea1cbfce339dc7eb60d8
                                                                                          • Opcode Fuzzy Hash: 32b332302b96a39907b6c4c59e785b77f44f415119f85991a0420bfee7017833
                                                                                          • Instruction Fuzzy Hash: F1C19B74548382CFD715CF58C144F6AB7E8FF84704F04496AF99A8B291E738CA49CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • @, xrefs: 01978591
                                                                                          • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0197855E
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 01978421
                                                                                          • LdrpInitializeProcess, xrefs: 01978422
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-1918872054
                                                                                          • Opcode ID: 2706a310b914fb5f48f7127fb3b0a749d3f84f25f4ce14a81422f3c563502f9e
                                                                                          • Instruction ID: 2aa38375ad087932ecb337df4bb9f3936c2b04daeb8e294580585fb35150ac3e
                                                                                          • Opcode Fuzzy Hash: 2706a310b914fb5f48f7127fb3b0a749d3f84f25f4ce14a81422f3c563502f9e
                                                                                          • Instruction Fuzzy Hash: 0C916871508345AFE721EF65CC85FABBAECBF84784F40092EFA8C96151E270D944CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 019B22B6
                                                                                          • .Local, xrefs: 019728D8
                                                                                          • SXS: %s() passed the empty activation context, xrefs: 019B21DE
                                                                                          • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 019B21D9, 019B22B1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                                          • API String ID: 0-1239276146
                                                                                          • Opcode ID: 03f59b449ac6f3c60b12b9dcc021ee7a70186eda2be0a6f635c646809fc8af8b
                                                                                          • Instruction ID: b4c5edd95fae2561be4ab7e3058d98f36014fbe25cd5b1d220d2f1f9aac516c7
                                                                                          • Opcode Fuzzy Hash: 03f59b449ac6f3c60b12b9dcc021ee7a70186eda2be0a6f635c646809fc8af8b
                                                                                          • Instruction Fuzzy Hash: FDA1B031910229DBDB25CF68C984BE9B7B5FF58354F2845E9D90CAB251D730AE81CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RtlDeactivateActivationContext, xrefs: 019B3425, 019B3432, 019B3451
                                                                                          • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 019B3456
                                                                                          • SXS: %s() called with invalid flags 0x%08lx, xrefs: 019B342A
                                                                                          • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 019B3437
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                                          • API String ID: 0-1245972979
                                                                                          • Opcode ID: 5fa1dcf96d74ead1399a172c1a8bb12c51d0bb859d96623a182fb016561b531f
                                                                                          • Instruction ID: de4a75749a2708e1a0de6e3d4823bbe1c098361287fd4fcbc3ee0bee879bc4aa
                                                                                          • Opcode Fuzzy Hash: 5fa1dcf96d74ead1399a172c1a8bb12c51d0bb859d96623a182fb016561b531f
                                                                                          • Instruction Fuzzy Hash: 356121366007129BD722CF1DC981FBAB7EABF80B51F19852DE85D9B242D734E901CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 019A10AE
                                                                                          • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 019A106B
                                                                                          • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 019A0FE5
                                                                                          • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 019A1028
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                                          • API String ID: 0-1468400865
                                                                                          • Opcode ID: 9b836927c9c42dddff9c12a0ab318837b2c77f95102d504f962b460f381f2072
                                                                                          • Instruction ID: c5656b6ebc36bef3f380fd7b47d1181235f29b8adbf3110a396a85d0d161e7ae
                                                                                          • Opcode Fuzzy Hash: 9b836927c9c42dddff9c12a0ab318837b2c77f95102d504f962b460f381f2072
                                                                                          • Instruction Fuzzy Hash: 9E71CDB19043459FCB21EF18C884F9B7BADAF96764F400868F94D8B246D334D589CBD2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • LdrpDynamicShimModule, xrefs: 019AA998
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 019AA9A2
                                                                                          • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 019AA992
                                                                                          • apphelp.dll, xrefs: 01962462
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-176724104
                                                                                          • Opcode ID: 3c870527c84c305179e94551ac807d6a6d34faa1671acb6fe8c003db31e60f99
                                                                                          • Instruction ID: cb4de5b81f391a4724a2310160ab95054d5022aceab9826f932cf103a342628a
                                                                                          • Opcode Fuzzy Hash: 3c870527c84c305179e94551ac807d6a6d34faa1671acb6fe8c003db31e60f99
                                                                                          • Instruction Fuzzy Hash: 4A316879A00202ABDB32DF5DDC85FAA7BB9FFC8B00F550419F8096B245C7B49946C790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • HEAP[%wZ]: , xrefs: 01953255
                                                                                          • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0195327D
                                                                                          • HEAP: , xrefs: 01953264
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                                          • API String ID: 0-617086771
                                                                                          • Opcode ID: 6b52603d93f77221a7d295e8f86a434a2a0d61aef288cf86f0cd47315569c006
                                                                                          • Instruction ID: f0a151fba94ad02f85fee498b7772fa67610108a17811ecc79c93493052ccbfc
                                                                                          • Opcode Fuzzy Hash: 6b52603d93f77221a7d295e8f86a434a2a0d61aef288cf86f0cd47315569c006
                                                                                          • Instruction Fuzzy Hash: C692BC71A04249DFDB65CF68C440BAEBBF5FF48304F188499E84AAB392D735AA45CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                                          • API String ID: 0-4253913091
                                                                                          • Opcode ID: 0bf4274b762defb600fec98e9da4c1cffda4d32b19c7c7ec1261cf913b778ed6
                                                                                          • Instruction ID: 032e0c581ba4a4c4c47e61bfb87c54c56400ce83143bf8beac20f86da3e62118
                                                                                          • Opcode Fuzzy Hash: 0bf4274b762defb600fec98e9da4c1cffda4d32b19c7c7ec1261cf913b778ed6
                                                                                          • Instruction Fuzzy Hash: FDF1AB30B00606DFEB55CF68C894F6AB7B5FF84304F198568E91AAB385D730E985CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: $@
                                                                                          • API String ID: 2994545307-1077428164
                                                                                          • Opcode ID: 7f21551a06d3198c5f0640c2ff6b0ac7ef363fd70bbd3084aec1e0797e80f22f
                                                                                          • Instruction ID: a3c25f7fb427ffaaf6b57667a5c0d35219a93e314cd2ad85d083e27ceb52bbb9
                                                                                          • Opcode Fuzzy Hash: 7f21551a06d3198c5f0640c2ff6b0ac7ef363fd70bbd3084aec1e0797e80f22f
                                                                                          • Instruction Fuzzy Hash: 53C260716083419FD729CF68C881BABBBE9BFC8754F04892DE98D97241D734D845CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: FilterFullPath$UseFilter$\??\
                                                                                          • API String ID: 0-2779062949
                                                                                          • Opcode ID: 2e5c7d0f485f819ac8ad71ed988fa94fa2dc6a669641b9bfbdd9b9b21e737cd2
                                                                                          • Instruction ID: 1548142f0d65dd7dcca3cc9ea8073d25d4a4b87d6292b98f17ef821ab3f53100
                                                                                          • Opcode Fuzzy Hash: 2e5c7d0f485f819ac8ad71ed988fa94fa2dc6a669641b9bfbdd9b9b21e737cd2
                                                                                          • Instruction Fuzzy Hash: F6A14B759116299BDF31DF68CC88BAAB7B8EF88711F1001EAE90DA7250D7359E84CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 019AA121
                                                                                          • Failed to allocated memory for shimmed module list, xrefs: 019AA10F
                                                                                          • LdrpCheckModule, xrefs: 019AA117
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-161242083
                                                                                          • Opcode ID: eda8f4746f670e19246eebb07dd1c11fe4880389522a2b829b5028d2650ed626
                                                                                          • Instruction ID: 573f599d3dbf714891d0db4e66b22b48aeebaf67c2f23871568cfbfccccbce2a
                                                                                          • Opcode Fuzzy Hash: eda8f4746f670e19246eebb07dd1c11fe4880389522a2b829b5028d2650ed626
                                                                                          • Instruction Fuzzy Hash: A671B374E00205AFDB25DF68CD85BAEB7F8FB88304F18446DE4099B255D739A946CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                                          • API String ID: 0-1334570610
                                                                                          • Opcode ID: 50a266c350549ac66304f819e83c1da3c4ad1cce6abf5b9d093e365a0e573d66
                                                                                          • Instruction ID: 82415c4646f77906919082dd713b5d94b8656f862964b86c178792ebaa7120f3
                                                                                          • Opcode Fuzzy Hash: 50a266c350549ac66304f819e83c1da3c4ad1cce6abf5b9d093e365a0e573d66
                                                                                          • Instruction Fuzzy Hash: 7E61BD30600302DFEB69CF28D584B6ABBE5FF84304F198959F85D9B296D770E881CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • LdrpInitializePerUserWindowsDirectory, xrefs: 019B82DE
                                                                                          • Failed to reallocate the system dirs string !, xrefs: 019B82D7
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 019B82E8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-1783798831
                                                                                          • Opcode ID: ad998049b97891764d97d46a2dff9a0653bbc2e591df91cb72da3a61a4574291
                                                                                          • Instruction ID: 2b4115b020d194cce72932c3e6ec201f7f40cf0fab243983db86303b430b5423
                                                                                          • Opcode Fuzzy Hash: ad998049b97891764d97d46a2dff9a0653bbc2e591df91cb72da3a61a4574291
                                                                                          • Instruction Fuzzy Hash: 6341D175544302ABD721EB68DD85B9BBBECBF89790F00492AF94DD3250EB70D901CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • @, xrefs: 019FC1F1
                                                                                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 019FC1C5
                                                                                          • PreferredUILanguages, xrefs: 019FC212
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                                          • API String ID: 0-2968386058
                                                                                          • Opcode ID: bf51a960a6dac28e2d27706e3783fc47aef16d17f72f68553a33777bde750ec5
                                                                                          • Instruction ID: e45cdb0e5a60d41cf92e06514e1543f8bc3312d75fce74bfeab0d4eac28fd10d
                                                                                          • Opcode Fuzzy Hash: bf51a960a6dac28e2d27706e3783fc47aef16d17f72f68553a33777bde750ec5
                                                                                          • Instruction Fuzzy Hash: 91414F75A0020DBBEB11DAD8C851FEEBBBCEB54705F14806AEA0DA7240D774DA448B50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                                          • API String ID: 0-1373925480
                                                                                          • Opcode ID: 060ed4ba260110d343f651e46fdcf4b72b16435c7e628a06ddadb101d0291c48
                                                                                          • Instruction ID: 209dc5b7c44760f3770bf9f831288cc5c0c80248ca936c41a7c36166f34aafed
                                                                                          • Opcode Fuzzy Hash: 060ed4ba260110d343f651e46fdcf4b72b16435c7e628a06ddadb101d0291c48
                                                                                          • Instruction Fuzzy Hash: 7F411331A003598BEB26DFE9C840BADBBB8FFA5340F14445ADA49FBB91D7348901CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 019C4888
                                                                                          • LdrpCheckRedirection, xrefs: 019C488F
                                                                                          • minkernel\ntdll\ldrredirect.c, xrefs: 019C4899
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                                          • API String ID: 0-3154609507
                                                                                          • Opcode ID: de981eee978e375bb36b20e5efa652f75b544988e3755bfc2f4a0938918376c9
                                                                                          • Instruction ID: 8d22a90f908aa216d366c49d324148e9dd1d69e27dc8c51036b2e857a7940ac4
                                                                                          • Opcode Fuzzy Hash: de981eee978e375bb36b20e5efa652f75b544988e3755bfc2f4a0938918376c9
                                                                                          • Instruction Fuzzy Hash: 89419D32B046519BDB22CE68D860A27BBE8AF89E51B05066DFDCC97255D730E801CB93
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                                          • API String ID: 0-2558761708
                                                                                          • Opcode ID: 3c183e738e35b20432328c879b129e485bb6b63367b06563d8f557aa6ae4935a
                                                                                          • Instruction ID: 2ffaeed25977beeb7884c48463f9fe15ac744010b6a9afaaca72d0d1ccab7634
                                                                                          • Opcode Fuzzy Hash: 3c183e738e35b20432328c879b129e485bb6b63367b06563d8f557aa6ae4935a
                                                                                          • Instruction Fuzzy Hash: 6B11E1323141029FEB69CB18C481F7AB3E9EF80B1AF1A8519F80EDB251DB30D849C791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • Process initialization failed with status 0x%08lx, xrefs: 019C20F3
                                                                                          • minkernel\ntdll\ldrinit.c, xrefs: 019C2104
                                                                                          • LdrpInitializationFailure, xrefs: 019C20FA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                                          • API String ID: 0-2986994758
                                                                                          • Opcode ID: 2f52c243b172f885cbb5199be51f77ba87a05b71d41805419ad89326eb8bb51c
                                                                                          • Instruction ID: bd7553582a527c1e701d2931248374985cfe8dfbedf3e226caadfc0f48798c16
                                                                                          • Opcode Fuzzy Hash: 2f52c243b172f885cbb5199be51f77ba87a05b71d41805419ad89326eb8bb51c
                                                                                          • Instruction Fuzzy Hash: EBF0AF39A40318ABEA24EB4C9D46FA93B6CFB81E54F100069F64867285D2E0A941C792
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: #%u
                                                                                          • API String ID: 48624451-232158463
                                                                                          • Opcode ID: 3efb34f99a86ed14ffc23940e5bd80ceca3c6d58cae72c6a07806486c5bc1bd6
                                                                                          • Instruction ID: 6a3065ca65c623510c8a0b0ffad245c3a72d7fb75bbfd9d1e2381460e94ffc69
                                                                                          • Opcode Fuzzy Hash: 3efb34f99a86ed14ffc23940e5bd80ceca3c6d58cae72c6a07806486c5bc1bd6
                                                                                          • Instruction Fuzzy Hash: 30714C71A0014A9FDB01DF98C980FAEBBF8BF48744F194065E909A7251E674EE05CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • LdrResSearchResource Exit, xrefs: 0194AA25
                                                                                          • LdrResSearchResource Enter, xrefs: 0194AA13
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                                          • API String ID: 0-4066393604
                                                                                          • Opcode ID: b87b54b607d99b3ef66886687d910749f08b4582a2964ce51bb2aff35a40d870
                                                                                          • Instruction ID: 504aff2f34a9a8b67f6ddc204f82518cfce05dc1290574dbbe9e9387ccef7b98
                                                                                          • Opcode Fuzzy Hash: b87b54b607d99b3ef66886687d910749f08b4582a2964ce51bb2aff35a40d870
                                                                                          • Instruction Fuzzy Hash: FFE18271E802199FEB22CF99C980FAEBBBEFF54311F50442AE90AE7251D7349944CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `$`
                                                                                          • API String ID: 0-197956300
                                                                                          • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                          • Instruction ID: 180b1c94abb03f8c75ec0fa4180756701f78bb89244d64de1a0699537963e1b6
                                                                                          • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                          • Instruction Fuzzy Hash: 5DC19F312043429BE726CF28D841B6BBBE5AFC4318F188A2DF696CB2D1D775E505CB41
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: Legacy$UEFI
                                                                                          • API String ID: 2994545307-634100481
                                                                                          • Opcode ID: f140f1def98a182b06fd81f7f665e5942bd52e984214c3edffa67dcbe352adc6
                                                                                          • Instruction ID: bb6f964ab13ea882953204992d8b34d36bce3cdf00f6b4b0320768528f472ae5
                                                                                          • Opcode Fuzzy Hash: f140f1def98a182b06fd81f7f665e5942bd52e984214c3edffa67dcbe352adc6
                                                                                          • Instruction Fuzzy Hash: 31614A71E006199FDB15DFA88980BEEBBB9FB48700F14846DE65DEB251D731A900CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @$MUI
                                                                                          • API String ID: 0-17815947
                                                                                          • Opcode ID: a58d210a8a6d44cebb4879d6774a1bebf99a0837ce7a6ae34fcd639d43ad3fcf
                                                                                          • Instruction ID: 50f052725fb6c43b7cd57cddc53e8e6ba7eb4d9fa1ca0af1d446dfe98565e9eb
                                                                                          • Opcode Fuzzy Hash: a58d210a8a6d44cebb4879d6774a1bebf99a0837ce7a6ae34fcd639d43ad3fcf
                                                                                          • Instruction Fuzzy Hash: 4851FA71E0021DAFDB11DFA9CC94EEEBBFDAB44754F100529E619F7250D6309905CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • kLsE, xrefs: 01940540
                                                                                          • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0194063D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                                          • API String ID: 0-2547482624
                                                                                          • Opcode ID: de6980fd6b573ae6bae69636033d253802a0de9e4d59f347e84b464e289fd580
                                                                                          • Instruction ID: 765db01008f92531c76ce721210b54467943aa506b19d595a5163b53c24140df
                                                                                          • Opcode Fuzzy Hash: de6980fd6b573ae6bae69636033d253802a0de9e4d59f347e84b464e289fd580
                                                                                          • Instruction Fuzzy Hash: F351BB715047429BD724EF69C440AE7BBE8AF84305F18893EFAAE87241E770D545CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RtlpResUltimateFallbackInfo Exit, xrefs: 0194A309
                                                                                          • RtlpResUltimateFallbackInfo Enter, xrefs: 0194A2FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                                          • API String ID: 0-2876891731
                                                                                          • Opcode ID: 4625ee0ea3d634dfdc9046e30e63193ebfaad6979485085a9fbd2bd8bb97e31c
                                                                                          • Instruction ID: 852fa0bb6b1a999bac4379e7027f4b7a6ecbc39595c516cf989a78bf9e18ab64
                                                                                          • Opcode Fuzzy Hash: 4625ee0ea3d634dfdc9046e30e63193ebfaad6979485085a9fbd2bd8bb97e31c
                                                                                          • Instruction Fuzzy Hash: 0241F330A44649CFEB25CF59C440F6DBBB8FF85701F144469E90ADB291E375D940CB80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: Cleanup Group$Threadpool!
                                                                                          • API String ID: 2994545307-4008356553
                                                                                          • Opcode ID: 8f3647ad7bd6792a933649f69b4bc780993c57d2745ba5aaa5b742dccc039385
                                                                                          • Instruction ID: 680078c1118b86c2f4c37fda896333582503475cffd3559a155fdbc543995b88
                                                                                          • Opcode Fuzzy Hash: 8f3647ad7bd6792a933649f69b4bc780993c57d2745ba5aaa5b742dccc039385
                                                                                          • Instruction Fuzzy Hash: B901ADB2240704AFE312DF14CD46B1A77E8EB85715F058939A64CC7190E334D904CB46
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: MUI
                                                                                          • API String ID: 0-1339004836
                                                                                          • Opcode ID: 01dc49b3391694af2e6c011cef3b29f66b0b394779495b8e42bc3192d9f644eb
                                                                                          • Instruction ID: 67fdc52ee4f838634fcceaf404442a340fdc86313b403f8134b771cf3d965220
                                                                                          • Opcode Fuzzy Hash: 01dc49b3391694af2e6c011cef3b29f66b0b394779495b8e42bc3192d9f644eb
                                                                                          • Instruction Fuzzy Hash: C8826A79E012198FEB25CFA9C880FEDBBB5BF48710F14816AE95DAB391D7309941CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID: 0-3916222277
                                                                                          • Opcode ID: d611c8aceaed75a64578372bc8901b7574e1b7b47d110fb3aae5f483a69cbf7a
                                                                                          • Instruction ID: 75abaf251f20eb36666d90271c551ce8a40683d00998c1d5fe02faec6f71f22d
                                                                                          • Opcode Fuzzy Hash: d611c8aceaed75a64578372bc8901b7574e1b7b47d110fb3aae5f483a69cbf7a
                                                                                          • Instruction Fuzzy Hash: D8918471900219AFEB21DF95CD85FAEBBB8EF54B50F100059F609BB291D774AD00CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID: 0-3916222277
                                                                                          • Opcode ID: d7e09d08a35b523bb6621a01cca6c65cb7eef2043fef34c87154337291c9d085
                                                                                          • Instruction ID: fcb7212772e7c38742724ad6eae1de7bac44871b43239b970c0ae98d70819a2a
                                                                                          • Opcode Fuzzy Hash: d7e09d08a35b523bb6621a01cca6c65cb7eef2043fef34c87154337291c9d085
                                                                                          • Instruction Fuzzy Hash: 85917E3190064ABADB23EFA5DC48FAFBBB9EF85740F140029F509A7250EB759905CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: GlobalTags
                                                                                          • API String ID: 0-1106856819
                                                                                          • Opcode ID: 8466b1f8c94f5da85aea04f69c640bd0a30f6e9707b20760bd698f502db40bcb
                                                                                          • Instruction ID: de37f496e2b533ad34983d80104e5cf5b73a3cc631d1fce36db3482d960ddc18
                                                                                          • Opcode Fuzzy Hash: 8466b1f8c94f5da85aea04f69c640bd0a30f6e9707b20760bd698f502db40bcb
                                                                                          • Instruction Fuzzy Hash: 21715DB5E0021A9BDF28CF99C6D0AEDBBB5BF88711F14812EE509A7241E731A941CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .mui
                                                                                          • API String ID: 0-1199573805
                                                                                          • Opcode ID: 44c10c1df654e9657501e164317d8493bc028db44cf4922b9d5ed02e9b610df4
                                                                                          • Instruction ID: cc564d65daf1dc9d2f098b5fad0ca9c5b0689538ca7f6956d112df7bc5d5a841
                                                                                          • Opcode Fuzzy Hash: 44c10c1df654e9657501e164317d8493bc028db44cf4922b9d5ed02e9b610df4
                                                                                          • Instruction Fuzzy Hash: A4519472D0022A9BDF12DF99D848EAEBBF9BF44A50F054169E919FB300D7349901CBE4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: EXT-
                                                                                          • API String ID: 0-1948896318
                                                                                          • Opcode ID: 10359001051677edb123ebf12d98270f5498745f5ef4ffeed297772940cf7658
                                                                                          • Instruction ID: c055e51af1b13b50793cc57f46c8f636de094e38ebb8192fea92d0a8f8f1fb94
                                                                                          • Opcode Fuzzy Hash: 10359001051677edb123ebf12d98270f5498745f5ef4ffeed297772940cf7658
                                                                                          • Instruction Fuzzy Hash: 55417F72508306ABD751DA75C880B6BFBECAFC8714F44092DBE8CE7140E675DA04C7A6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: BinaryHash
                                                                                          • API String ID: 0-2202222882
                                                                                          • Opcode ID: 8737962c1a74e0ea7285355010c4758a29c71cde96f7548e758458a674fbd968
                                                                                          • Instruction ID: 52f8611b1648367e1d1c3de1b2901df017e1bda246ecfc5286e2bcacfedfb705
                                                                                          • Opcode Fuzzy Hash: 8737962c1a74e0ea7285355010c4758a29c71cde96f7548e758458a674fbd968
                                                                                          • Instruction Fuzzy Hash: 634151B1D0022DABDB21DB60CD84FDEB77CAB85714F0045A5EA0CAB140DB709E89CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #
                                                                                          • API String ID: 0-1885708031
                                                                                          • Opcode ID: dbe1d1cfddeda6bd96da4347615b69ecd08398cfe397d33d929debf84839edf7
                                                                                          • Instruction ID: 7f4e40793478cbb4da1cd320ea9b6341bc849921ceb2e172ae4ae32843e63843
                                                                                          • Opcode Fuzzy Hash: dbe1d1cfddeda6bd96da4347615b69ecd08398cfe397d33d929debf84839edf7
                                                                                          • Instruction Fuzzy Hash: 76310731E007599BEB22DF79C854BEE7BBCDF54704F148028EA49AB282D775E805CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: BinaryName
                                                                                          • API String ID: 0-215506332
                                                                                          • Opcode ID: 6ff8c96a25dce915a51e852c340d031af4c543e3bb7f6b2ff18026b1cac9bb90
                                                                                          • Instruction ID: 89a24bfe560b24eea03481ca348022d53945d0e34117a11b5217cc11beda29c7
                                                                                          • Opcode Fuzzy Hash: 6ff8c96a25dce915a51e852c340d031af4c543e3bb7f6b2ff18026b1cac9bb90
                                                                                          • Instruction Fuzzy Hash: 58310B36900529BFEB15DB59C995EBFBB74EF80750F114129E909AB250D730EE04D7D0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 019C895E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                                          • API String ID: 0-702105204
                                                                                          • Opcode ID: a6143daa9037824fb00545337c2c0be19444163ac662a3ac063e105b10e6c610
                                                                                          • Instruction ID: e7944604a3352d37c1368974327f613640b1033d217c0b46dfd6afc2e270399c
                                                                                          • Opcode Fuzzy Hash: a6143daa9037824fb00545337c2c0be19444163ac662a3ac063e105b10e6c610
                                                                                          • Instruction Fuzzy Hash: 8F01F736600211ABE6209B999C85FD67B69FFC1F55F04041CF6CE16151CB30A841C797
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e780f239e8c71864695559cd0bbcc45dfd32252a93c409cf3f184eabf967354a
                                                                                          • Instruction ID: a1c7ffe2dfcfba477e07b0caa01e122de6f46ff68091b6b601257b5f34c78513
                                                                                          • Opcode Fuzzy Hash: e780f239e8c71864695559cd0bbcc45dfd32252a93c409cf3f184eabf967354a
                                                                                          • Instruction Fuzzy Hash: F842C4716083419BE726CF68C894A6FBBEDBFC8740F08092DFA8A97250D771D945CB52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c9e847adeed4f1aae8be9072c12012ff97c580dbc55fee2f314213df18e2c19e
                                                                                          • Instruction ID: fe9d44f49ff56bc59288bb77c7159e1a1e3bd6725b49a1ced93e16aecff1b50b
                                                                                          • Opcode Fuzzy Hash: c9e847adeed4f1aae8be9072c12012ff97c580dbc55fee2f314213df18e2c19e
                                                                                          • Instruction Fuzzy Hash: 26426C75E002199FEB25CF69C841BADBBF9BF88311F15C099E94CAB242D7349985CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e9967f26b15d5629f8c89b6b6a129d01affe66f3cdf69febacbfb988c8f5cdc5
                                                                                          • Instruction ID: cfda5ae65dcf6d6d187767f2c2dc464f1ef0f64df09109ee0d2971f4e775467e
                                                                                          • Opcode Fuzzy Hash: e9967f26b15d5629f8c89b6b6a129d01affe66f3cdf69febacbfb988c8f5cdc5
                                                                                          • Instruction Fuzzy Hash: 5E320F70A007458FEB25CF69C854BBEBBFABF84704F58451DD58E9B284D735A80ACB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2be694063cc049cbcec77641937ccd3bf31e261acafbaecee39edbb28327cf7f
                                                                                          • Instruction ID: 57ae6b6e5edae3c01e1275b86a30a9455e025a7e2d2ce759261875deb06dabb4
                                                                                          • Opcode Fuzzy Hash: 2be694063cc049cbcec77641937ccd3bf31e261acafbaecee39edbb28327cf7f
                                                                                          • Instruction Fuzzy Hash: F722F4746046618FEB26CF2DC098776BBF5BF45701F088859E98E8F2A6E735D442CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 99f7a260168c6c4d6a541f158d18ce0d649ea7b1394e35784504d3122326aa03
                                                                                          • Instruction ID: 290d522bb44241b361f0113b9eac950dd98a6586c9b875492bf3bd3962a396cf
                                                                                          • Opcode Fuzzy Hash: 99f7a260168c6c4d6a541f158d18ce0d649ea7b1394e35784504d3122326aa03
                                                                                          • Instruction Fuzzy Hash: ED225F70E0021ADBCF15CF99C4809BEFBFABF88715B54845AE9499B641E734ED41CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3dfae7215a06350b05984504a7a9945a3ae0c6786f36f4dd603e08ff6ee10701
                                                                                          • Instruction ID: 1e85c6699058995a8f7fd272d40c2abba240b7a372e3f36ac99da54bd69b612b
                                                                                          • Opcode Fuzzy Hash: 3dfae7215a06350b05984504a7a9945a3ae0c6786f36f4dd603e08ff6ee10701
                                                                                          • Instruction Fuzzy Hash: 5832AFB1A04605CFDB25CF68C880FAABBF5FF49301F148969E959AB351D734E845CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                          • Instruction ID: 595ce7ee7d12423a0485f9ed7113efa8d81932311647a1d0f65bcf704d227a94
                                                                                          • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                          • Instruction Fuzzy Hash: 70F17171E0021A9BDB15CFE9C590BAEBBFDBF48714F058129E909AB344D774E841CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 564947956cf769c83eb25f494805f5f2be397b56b71cdbf018cc65ceeb4d7a10
                                                                                          • Instruction ID: e647de04a17dc4520849babe3de0bbd29691871cf6e364c5955c4170b8810767
                                                                                          • Opcode Fuzzy Hash: 564947956cf769c83eb25f494805f5f2be397b56b71cdbf018cc65ceeb4d7a10
                                                                                          • Instruction Fuzzy Hash: E3D10171E0060A9BDF05CFA9C841BFEB7F5AF88304F18C569D959A7282D739E905CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dd359475b996b2a7437e90d028d774ad9587a2e626928481ce97bccad9fe5c4d
                                                                                          • Instruction ID: 4358bff50db001bce2efa8e541fcd104c44426b6b46614b5bfd4c1862399cad5
                                                                                          • Opcode Fuzzy Hash: dd359475b996b2a7437e90d028d774ad9587a2e626928481ce97bccad9fe5c4d
                                                                                          • Instruction Fuzzy Hash: 99E180B5508342CFC715CF28C490E6ABBE4FF8A314F058A6DE99997351E731E909CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 21b573f9cbf45a0706ea6d876337b34945fe7ebd1d04f62c8497d8a2f3d0d164
                                                                                          • Instruction ID: 555d475535a76c378973ad75d59689be8f9a4a1f4fc4372273864ba3a0fbbfb6
                                                                                          • Opcode Fuzzy Hash: 21b573f9cbf45a0706ea6d876337b34945fe7ebd1d04f62c8497d8a2f3d0d164
                                                                                          • Instruction Fuzzy Hash: 27D1CF71A0020A9BDF15DF68D880EBA77AABFD4714F04462DF91EDB280E734E951CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                          • Instruction ID: 2e828ba19048224094df60e63efb4c9f180ac0fcc4ca02e76e3981af6420e96f
                                                                                          • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                          • Instruction Fuzzy Hash: A4B1C874A00605AFEF24DF58C944EAFBBBAFF84744F10445EAA8A97790DB34E905CB11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                          • Instruction ID: 7ef28e772b8ed3b026bfada8b9858ecd2fea0133130b8b87026507ce7d6e2935
                                                                                          • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                          • Instruction Fuzzy Hash: 6CB10731700646AFDB15DB68C850BBEBBFAAF84304F180569EA5EA7281D770ED45CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f448ee58883faccb3d7525465a29df4e36f3553d0d7a3e861f8a7cd347ae8d15
                                                                                          • Instruction ID: 3a0f0f52b244e047edf551d41f291ac04884ebba6ebb72bf4765c4910ddb7bb2
                                                                                          • Opcode Fuzzy Hash: f448ee58883faccb3d7525465a29df4e36f3553d0d7a3e861f8a7cd347ae8d15
                                                                                          • Instruction Fuzzy Hash: 12C16774608381CFE764CF59C484BABB7E9BF88704F44496DE98987291E774E908CF92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 413e208e21bbfe81c5e4de4b6f68ea5c93e9a52c74bf3dc974c088afbda2b320
                                                                                          • Instruction ID: 23a6e7f1b75d35815d037ec8fe1c5bf5430d91e970a9c9c46ef0d2b76554396c
                                                                                          • Opcode Fuzzy Hash: 413e208e21bbfe81c5e4de4b6f68ea5c93e9a52c74bf3dc974c088afbda2b320
                                                                                          • Instruction Fuzzy Hash: 1DB17170A046668BDB25DF68C890BA9B3F5EF84704F0485EAD50EE7281EB70DD85CB21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6da79ae8247abb81b9c5cf080ddd9ed49a167e1b0ae12f7957761c047c2f2959
                                                                                          • Instruction ID: bbbd53c85839d1247372da4ea39e429f2d61d20f14fc9bbf3d6ce5ed7ba93a80
                                                                                          • Opcode Fuzzy Hash: 6da79ae8247abb81b9c5cf080ddd9ed49a167e1b0ae12f7957761c047c2f2959
                                                                                          • Instruction Fuzzy Hash: 12A12735E006199FEB21DB9CC848FAEBBBCBF40754F050125EA09AB291D7789D45CBE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e32db24280bc9d1bd00855304a842cce158e9681490d990d26e57cde6b84f21c
                                                                                          • Instruction ID: e319de9442ec2f022fab34e62c9fc29f6eadd13222b4da0ab65fb31639fc2106
                                                                                          • Opcode Fuzzy Hash: e32db24280bc9d1bd00855304a842cce158e9681490d990d26e57cde6b84f21c
                                                                                          • Instruction Fuzzy Hash: 78A1D270B00716DFDB25EF69C990BAAB7B9FF54715F084029EA0D97281EB34E816CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 71fb6cf8cadef470bafb4576b804da9af51933c32850407ff77d108e8bfa927f
                                                                                          • Instruction ID: bca36982fef5463aa00a8b683cb170b33823143aa97971f568a7ca5177ba1ba9
                                                                                          • Opcode Fuzzy Hash: 71fb6cf8cadef470bafb4576b804da9af51933c32850407ff77d108e8bfa927f
                                                                                          • Instruction Fuzzy Hash: D5A1DE72A14652EFD712DF2CC980B2ABBE9FF88744F050928F9899B655D334ED01CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5f64a1b59919a983171c6d9d3b4962ead0877d99b7d45b6915340b85d1033145
                                                                                          • Instruction ID: 9fb549a0213635cee245802cf1959e3543abc4d232b5f69c0fedbd06679db5f5
                                                                                          • Opcode Fuzzy Hash: 5f64a1b59919a983171c6d9d3b4962ead0877d99b7d45b6915340b85d1033145
                                                                                          • Instruction Fuzzy Hash: B791D671D0021AAFDB15CFA8D884BBEBFB9AF48B11F15416DE658EB341D734D9008BA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d199fdb217c0bbc9f413d5c327df05c12561be53e30b9e97c1d4a246fc3962d3
                                                                                          • Instruction ID: c9204c1ac7e056b21ff72cb0f6d37d15a39cef2406db6d6c74184ebde859a62a
                                                                                          • Opcode Fuzzy Hash: d199fdb217c0bbc9f413d5c327df05c12561be53e30b9e97c1d4a246fc3962d3
                                                                                          • Instruction Fuzzy Hash: 12914631A00616DBEB65DF6CC440B7ABBA6FF84B19F054465ED0DAB340E735DA02C7A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e1aa196a779eb2c3e32b16a04c1b5b7041f1eab94ef825eb5415173c2953e8ad
                                                                                          • Instruction ID: e3a7f59da770b0622981cbd0c9690ae1740eb2f97afed7c2d8d203d6ebd9776c
                                                                                          • Opcode Fuzzy Hash: e1aa196a779eb2c3e32b16a04c1b5b7041f1eab94ef825eb5415173c2953e8ad
                                                                                          • Instruction Fuzzy Hash: 7F81B171E006169BDB15CF6DC840ABEBBF9FB48700F04842EE959E7640E334E941CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                          • Instruction ID: 7620e2ee9b3f3d94636e8282318c45a86f7ff18dfd5efdcedc8711dc885a2394
                                                                                          • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                          • Instruction Fuzzy Hash: B4818031A107099FDF1ACF99D890ABEBBB2FF84310F198569D9169B384DB34E905CB40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 963887eda28c8214f9b20ab12fe1017786efea89d7b7754affa26eab207647ce
                                                                                          • Instruction ID: 0ffb6e2e80097506f4955778615258093f5c8c0ccf0a102b7a6976b21fd3dc13
                                                                                          • Opcode Fuzzy Hash: 963887eda28c8214f9b20ab12fe1017786efea89d7b7754affa26eab207647ce
                                                                                          • Instruction Fuzzy Hash: 33813D71A00609AFDB25DFA9C980BEEBBFAFF88354F144429E559A7250D730AC45CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0d6403d1174aeeca5b133399a02f762398d302e53db20a371cde2f2569155846
                                                                                          • Instruction ID: 371a31e982cf007c5430de5bfeb0f0524fde4849b878ee61c3b39a2f4c77a2ea
                                                                                          • Opcode Fuzzy Hash: 0d6403d1174aeeca5b133399a02f762398d302e53db20a371cde2f2569155846
                                                                                          • Instruction Fuzzy Hash: C971DE75D0122ADBCB25CF58D890BBEBBB8FF48711F14451AE95AAB350D334A905CBE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 39b8381662fad6ce1ad429462657360bb80810b55e2229ba326348db5b73457e
                                                                                          • Instruction ID: 9da78b4842a6857b66e678fe8d2d3ff9628198d943b964fcb09e0416c18333b6
                                                                                          • Opcode Fuzzy Hash: 39b8381662fad6ce1ad429462657360bb80810b55e2229ba326348db5b73457e
                                                                                          • Instruction Fuzzy Hash: 21719C74A00605FFEB20DF99D944A9BBBF8FB80741B14815EE70CAB258C731CA49CB64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9a5a5fb3af123b32fd2d362df88e758c7ac869635d432d19ba5702b5973cbd9f
                                                                                          • Instruction ID: 3a71858446cb621cf22a68abd4176776ecf62e8eb23d1857b723766a7229cc63
                                                                                          • Opcode Fuzzy Hash: 9a5a5fb3af123b32fd2d362df88e758c7ac869635d432d19ba5702b5973cbd9f
                                                                                          • Instruction Fuzzy Hash: 8071AF36604242DFD351DF28C484B2AB7E9FF84310F0885AAEC9D9B351DB34E946CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                          • Instruction ID: c6c6d5fcff63ab85bd00e71090469214cce134abf0d90a93ca2c31275ca85dca
                                                                                          • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                          • Instruction Fuzzy Hash: 6C717E75E00609EFDB10DFA9C984EEEBBB8FF98740F144569E949A7250DB34EA01CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 50c529b2087e1399a3e9727737cdbee531de5eab17bab7977e7389749f14adf3
                                                                                          • Instruction ID: c70708f715aabfc7a3c131f54e1ae3d4ebfe6ca2a80d02d382b95fc07bcd0ad4
                                                                                          • Opcode Fuzzy Hash: 50c529b2087e1399a3e9727737cdbee531de5eab17bab7977e7389749f14adf3
                                                                                          • Instruction Fuzzy Hash: F671E432200701AFE732DF18C844F56BBFAEF80B51F158918E65A972A1DB75E944CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 476e6326cc289210894e28da84658d0c6a06928c7ca14dfe959e25b1b3d85bde
                                                                                          • Instruction ID: 0d769d46e09afc80fe36ee7b51fac9593bb95556338378d020648426c482ff08
                                                                                          • Opcode Fuzzy Hash: 476e6326cc289210894e28da84658d0c6a06928c7ca14dfe959e25b1b3d85bde
                                                                                          • Instruction Fuzzy Hash: 9981BF72A04306CFDB28CF98D884FADBBB5BF88715F594129E908AB285C7749D45CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e3f4eaba77e9070826b2883f758beaf71ec7ca98cf5e2fb8c452de4cedca7dca
                                                                                          • Instruction ID: f00ce8d404a55a1a18767c979d74e5b87a47205f0987790bfad90b748d6cebc3
                                                                                          • Opcode Fuzzy Hash: e3f4eaba77e9070826b2883f758beaf71ec7ca98cf5e2fb8c452de4cedca7dca
                                                                                          • Instruction Fuzzy Hash: 3A61AF71A00206DFDB19DF68C990BAEB7B9FF48315F144569EA1AEB291DB30D901CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1bf8353a9ae36b135c99b6328e497ee93cb914f845a971a3787728353a0cc959
                                                                                          • Instruction ID: 48d8fbef8c29cf51006f24d0c4bb579df356dc6a28f51d11adcb1e8b17835394
                                                                                          • Opcode Fuzzy Hash: 1bf8353a9ae36b135c99b6328e497ee93cb914f845a971a3787728353a0cc959
                                                                                          • Instruction Fuzzy Hash: D7519D72504612BFD712DE68C884F5BBBE8EBC5B50F01096DBB48DB150E670ED05C7A2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 41f506eda914877bc93a6ced8b379c9213adfe8e20ccff69843f3e7ccc81663b
                                                                                          • Instruction ID: 3dad40fa0595c5a772b7c348c5e041af8d42537e2eaa019fdb324e342615548b
                                                                                          • Opcode Fuzzy Hash: 41f506eda914877bc93a6ced8b379c9213adfe8e20ccff69843f3e7ccc81663b
                                                                                          • Instruction Fuzzy Hash: 2351B172A047029FD712DF28D840BAAB7E5FF94350F04492CF98997291D738E909CB99
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d9b365a556375c48b11dcfc23ab3f4d0be3dc48c153189e6ea4d68b2e7f6579f
                                                                                          • Instruction ID: 47b477377263a1e8b2e4748ef11a4c9c8abf76e9262ad87cbdd3b0fa4eb03d27
                                                                                          • Opcode Fuzzy Hash: d9b365a556375c48b11dcfc23ab3f4d0be3dc48c153189e6ea4d68b2e7f6579f
                                                                                          • Instruction Fuzzy Hash: 4F517170900705EFD722DF9AC888A6BFBF8FF94710F104A1ED25A576A1D770A545CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 20de2da0c43b7307e498399a564e09f3ffd299c9eff0ecf6cd1aa22eb647e57d
                                                                                          • Instruction ID: eae26f7d5e3a3609f402c3426bf9ffa771d8b8a7b5009a4dc2bbf65cfaeacb57
                                                                                          • Opcode Fuzzy Hash: 20de2da0c43b7307e498399a564e09f3ffd299c9eff0ecf6cd1aa22eb647e57d
                                                                                          • Instruction Fuzzy Hash: 02515C71610A05DFCB22EF69C9C0EAAB7FDFF54784F400869EA4A97260D734E941CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9a1b50da1527e8672effd92929d47e772565a0605764880becf75eaafb447bfb
                                                                                          • Instruction ID: b4bbdb7da8c7158991c06bae9d8820cec6365ad41809267cbc2a413a49207fac
                                                                                          • Opcode Fuzzy Hash: 9a1b50da1527e8672effd92929d47e772565a0605764880becf75eaafb447bfb
                                                                                          • Instruction Fuzzy Hash: 93519A716083029FD756DF29C984A6BBBE9BFC8204F444A2EF589C7250EB30D905CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                          • Instruction ID: 4bdc8ff37f1c2f0e5a0c966f7d0103252d8015a9bba1f29e19f901d30f047135
                                                                                          • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                          • Instruction Fuzzy Hash: 45516C71E0021AABDF15DF98C440BEEBBB9EF45754F05406AEA09AB250D738DE44CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                          • Instruction ID: 5b64b4bada02653668a87dd4364a0156b23102dd3c86fcaf870363758f3c1894
                                                                                          • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                          • Instruction Fuzzy Hash: 0E51B53190020AAFEF21DF95C884FBEBFB8AB40B25F11466DD55B67190D7309E40CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7598673edf0408b1087e3cf063a202f5f71eb2f618beca88e1e120e4bb6d355d
                                                                                          • Instruction ID: d2c29f9d4df89cf757adc3303cacb672ce2d18e652122c32733f5f6c1791d092
                                                                                          • Opcode Fuzzy Hash: 7598673edf0408b1087e3cf063a202f5f71eb2f618beca88e1e120e4bb6d355d
                                                                                          • Instruction Fuzzy Hash: 7341D770B01A119BD72BDB2DE954B7FBBAAEF91360F084119E915872C1DB3CD801C699
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6b5e12e49f856518c714a442679e4d4d74cd2ed1872b3a7b9e4cda7030fd91bc
                                                                                          • Instruction ID: a48b43e483647fd461552d7873f6eb0cbdbbe237afcdcfaf6c8181fc601a288d
                                                                                          • Opcode Fuzzy Hash: 6b5e12e49f856518c714a442679e4d4d74cd2ed1872b3a7b9e4cda7030fd91bc
                                                                                          • Instruction Fuzzy Hash: 2E519F75D00216EFCB21DFA9C880A9EBFB9FF88B54B554919E58DA7300D730AE41CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cb2d5e0a724397ce5ebcd1906af0c33226e35a6a2e5c5c57bf167175d0b59578
                                                                                          • Instruction ID: c6185052c47948d46e21d0b268472039e1443c14f7b5162d2f319082e3b4e188
                                                                                          • Opcode Fuzzy Hash: cb2d5e0a724397ce5ebcd1906af0c33226e35a6a2e5c5c57bf167175d0b59578
                                                                                          • Instruction Fuzzy Hash: B5410475740602EBDB25EFA89DC1F6F3769AF94718F04042CFE0E9B241D7B2A8018750
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                          • Instruction ID: 4e4116ac0edc33949127dd97f537a33596b99e50621f4e67793096f4e2072466
                                                                                          • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                          • Instruction Fuzzy Hash: EE41E772A007169FD726CF28D980A6AB7A9FF80314F05462EEA16872C0EB30ED54C7D0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9880e6d9a87cadc12a7a26b69a526485e296a212d02ed2084f4213a572fcb3d3
                                                                                          • Instruction ID: 9dd0bf72443720920269314385007ca8351e681f3ab886212419ea4e24d99b43
                                                                                          • Opcode Fuzzy Hash: 9880e6d9a87cadc12a7a26b69a526485e296a212d02ed2084f4213a572fcb3d3
                                                                                          • Instruction Fuzzy Hash: B041BF36D00219DBDB14DF98C440AEEBBB5BF8AB10F18815AF819F7250D7359D41CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 25fb704625c123771baf4bc3b03702ff6291ace4d3fc9a4518c223d8a1c6aef1
                                                                                          • Instruction ID: 889ffd02268bf00fa2dc62fa746add53730893e37b911207a5fa9784e143060a
                                                                                          • Opcode Fuzzy Hash: 25fb704625c123771baf4bc3b03702ff6291ace4d3fc9a4518c223d8a1c6aef1
                                                                                          • Instruction Fuzzy Hash: CB41A1756043029FD725DF28C880A6BB7EDFB84358F004829E95FC7615EB35E8458BA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                          • Instruction ID: 8c32adfa9d2564596d70388f5432e59cf462ca3c512a9575a706e1c9f36fc0ee
                                                                                          • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                          • Instruction Fuzzy Hash: CD515975A00219DFCB15CF98C6C0AAEF7B6FF84710F2481A9D919A7351D774AE42CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 26ddd2c8870f9cd48f02c4e6bb240ae134dc333cffd6a7afa1f7ea665b6c7375
                                                                                          • Instruction ID: 3fc9cbdd1cd6926ff3459092eb30770d5064603ac4fc7e47cf5fed6003cbafb0
                                                                                          • Opcode Fuzzy Hash: 26ddd2c8870f9cd48f02c4e6bb240ae134dc333cffd6a7afa1f7ea665b6c7375
                                                                                          • Instruction Fuzzy Hash: 5151D6B0904216EBDB26DB68CC04FA8BBB5FF56318F1482A5E51DA76D1E7349981CF80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6087c175546b735d988f8464561a7ad2a4eda1ec847cc5cd0e88479b089f0c61
                                                                                          • Instruction ID: 6ad0c8c3e3251651544963c11754f44db60aadf8a7b5e5227af120094666fd54
                                                                                          • Opcode Fuzzy Hash: 6087c175546b735d988f8464561a7ad2a4eda1ec847cc5cd0e88479b089f0c61
                                                                                          • Instruction Fuzzy Hash: 9B418D35E00229DBDF21EF6CC940FEA7BB8AF85741F0504A5EA0CAB241D7749E85CB95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                          • Instruction ID: 8750e06d165f89666ba9b7096dd1768a570b43f4622f1f3938ae5df66beb73dc
                                                                                          • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                          • Instruction Fuzzy Hash: CF41DA75F00215ABDB16DF99DC84ABFBBBAAF84340F154069E504D7385D674DD00CB54
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fa4560999a16da5452dfdc5c7422dd12fec5a4cc60a8047e558b848a403ba5c9
                                                                                          • Instruction ID: b50a83bdb21e7a328e6dcb472b5f065a58ce58f2fcef5499000d9d5d7a06a648
                                                                                          • Opcode Fuzzy Hash: fa4560999a16da5452dfdc5c7422dd12fec5a4cc60a8047e558b848a403ba5c9
                                                                                          • Instruction Fuzzy Hash: 3941B0756107029FE725CF28C580E66BBF9FF89314B184A6DE64F87A50E731E845CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: eaaba035d084fff748da6c91ad24471b6644d42a545bba22a73a7428dcd45c78
                                                                                          • Instruction ID: 2f151058037dd4e5f2629e6de798e4a6022ccb47679b73aa24a20e75f3bfd36e
                                                                                          • Opcode Fuzzy Hash: eaaba035d084fff748da6c91ad24471b6644d42a545bba22a73a7428dcd45c78
                                                                                          • Instruction Fuzzy Hash: E141D032940215CFDB21DF68C894BED7BB8FB58B61F484555E419BB391DB34E901CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6c3144a0800e870bf2f309d1118be370488162aa219f147df15a9868e44527ad
                                                                                          • Instruction ID: 01d7c38ce9a61ffb5f9e9a4c56f501db87dd9d123a34dc9a245866bd63fab4ff
                                                                                          • Opcode Fuzzy Hash: 6c3144a0800e870bf2f309d1118be370488162aa219f147df15a9868e44527ad
                                                                                          • Instruction Fuzzy Hash: CD412635E01202DBD729DF88C880F6ABBB5FF99B04F19812AE9099B255C775D842CFD0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 27fe62ea988e74a60e7d08784a3f5c4dcb662e4d7429d368f5a68442113add92
                                                                                          • Instruction ID: 4e00d21c44d01c19354aee2073d260f5def632a6cbe490e873192d2ce5e002af
                                                                                          • Opcode Fuzzy Hash: 27fe62ea988e74a60e7d08784a3f5c4dcb662e4d7429d368f5a68442113add92
                                                                                          • Instruction Fuzzy Hash: 77415C355083069FD712DF69D840E6BB7E9AFC4B94F400A2AF988D7250E734DE058BA3
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                          • Instruction ID: 2d1e789b47ff910134c25240f5a4a89f97ef4bc21c3d6b720f6c83c7ef3550ee
                                                                                          • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                          • Instruction Fuzzy Hash: F7416C31A00211DBEF11EE6D9454FBAFB75EBD1752F15806AE98ECB240D63B8D40CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d84ca64e1243c122fcfa992bf42092124b7ec9e20507f3bcf5b1eae3b3f775d9
                                                                                          • Instruction ID: 1116dbb1f0016b422d86ebdc56e6a46fd09f2e7a4e23078aeef6e293e566f4d5
                                                                                          • Opcode Fuzzy Hash: d84ca64e1243c122fcfa992bf42092124b7ec9e20507f3bcf5b1eae3b3f775d9
                                                                                          • Instruction Fuzzy Hash: 20417C71A00601EFD721DF18C840F66BBF8FF94315F288A2AE94D8B251E771E942CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                          • Instruction ID: 7332187869df5ca8641cd566dd274411120a9e7b635226a713f7dfb8271e844d
                                                                                          • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                          • Instruction Fuzzy Hash: F4411871A00605EFDB25CF98C980AAABBF8FF19700F14496DE55ADB691D330EA44CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 02542a7fe6f18612bec558f7bf4f28b8b435987bffce82bb6ac041070ef97ac8
                                                                                          • Instruction ID: 09d4d12a1be409000768397c841732d12441b3f559061335aabe81f383f46997
                                                                                          • Opcode Fuzzy Hash: 02542a7fe6f18612bec558f7bf4f28b8b435987bffce82bb6ac041070ef97ac8
                                                                                          • Instruction Fuzzy Hash: 9C41B1B1901701DFCB26EF69E900F69B7F5FF88311F14866AE40E9B2A1DB30A941CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4d85b155122263cbfbf840ee9ea955becb129717c7e9b012ebbc34784581888e
                                                                                          • Instruction ID: 668bd8051ecb7627f724b2d6bc36ed698048808c1481b5f91a0a9f2d406a9887
                                                                                          • Opcode Fuzzy Hash: 4d85b155122263cbfbf840ee9ea955becb129717c7e9b012ebbc34784581888e
                                                                                          • Instruction Fuzzy Hash: FE3188B1A00246EFDB52CF98C140B99BBF4FF48725F2085AED109EB291D7369902CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c5eaf07a7fe733a15d95791cc992ac232569509e499cf1b549b26628746bf4e8
                                                                                          • Instruction ID: 1a794331c4aaf1c85f25707d008a641a31ed68e29b8dfd49ad3a009e056d4f0d
                                                                                          • Opcode Fuzzy Hash: c5eaf07a7fe733a15d95791cc992ac232569509e499cf1b549b26628746bf4e8
                                                                                          • Instruction Fuzzy Hash: 57418976908301ABD320DF28C845B9BBBE8FF88614F008A2EF59CC7291D7709905CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 601deb05ff41af5c8dd1e961e9c992636072588225558e4ed006a8989aa4ca89
                                                                                          • Instruction ID: a78650d2c665e6501981a88e60072ee0f9aeac3e4fd8851df6324321c353372c
                                                                                          • Opcode Fuzzy Hash: 601deb05ff41af5c8dd1e961e9c992636072588225558e4ed006a8989aa4ca89
                                                                                          • Instruction Fuzzy Hash: AE41C376604752DFD320DF68C940A6AB7E9FFC8B40F18061DF99997680E730E905C7A6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fdf17a58dca4182e4650a499ba322944f1014efec69ff9d7422075ce2833e7d6
                                                                                          • Instruction ID: 8ece338c12cad10595c4a297da9f68b3472a81c59e25ba0b64ccbce6cacbcb64
                                                                                          • Opcode Fuzzy Hash: fdf17a58dca4182e4650a499ba322944f1014efec69ff9d7422075ce2833e7d6
                                                                                          • Instruction Fuzzy Hash: 9C41D1356043028BE729DF28D884F2ABBE9FF80B55F14482DFA498B291DB30D901DB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                          • Instruction ID: 94ac595194b2349355a5c4f58365dc4a1515d2598d0f4137ee4f25d7b190090c
                                                                                          • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                          • Instruction Fuzzy Hash: 61312531A04244AFDB52CB68CC44FEBBFE9AF54350F0845A5F85DE7352D2B49984CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e150e00a66a73bde9cf1c224f6ba2d6ec61341648524bb4efcdef456d5b4d2bf
                                                                                          • Instruction ID: 7f44248136aced3ea4fdb036723eaaf0ea17c9b9f7c483c16516458846e52606
                                                                                          • Opcode Fuzzy Hash: e150e00a66a73bde9cf1c224f6ba2d6ec61341648524bb4efcdef456d5b4d2bf
                                                                                          • Instruction Fuzzy Hash: D4319835750756ABD723DF55CC45F6B76F9AF99F50F000028BA08BB291DA64DD00C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a7c7b511fe255cc605d2788c459fa17fef67098a23f547cd0e30faf21a8b0d77
                                                                                          • Instruction ID: 7ca65c9674d29158a2ab2b45be665ffebcaddf9cbafa301e4520fd835e5a74cd
                                                                                          • Opcode Fuzzy Hash: a7c7b511fe255cc605d2788c459fa17fef67098a23f547cd0e30faf21a8b0d77
                                                                                          • Instruction Fuzzy Hash: 0A31CF32605201AFC321DF19D880F6AB7F9FB80361F0A446EFA9D9B252D730A905CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2a15db3bc1d3d7f0ec835ae0afef5097bd2ffbbfbd1e64d3e643388873ba4d08
                                                                                          • Instruction ID: 36555f9cb238e7dcaf05343fc92532e3411e739dc9579feecaa5093db5bddbe8
                                                                                          • Opcode Fuzzy Hash: 2a15db3bc1d3d7f0ec835ae0afef5097bd2ffbbfbd1e64d3e643388873ba4d08
                                                                                          • Instruction Fuzzy Hash: 0C41B171200745DFD726CF28C985FDA7BE9AF85754F058829FA5D8B250D770E844CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0b6f8258533bdfd1b38aae01638bf7f015bed783863309980cde1f96fd0ddcd5
                                                                                          • Instruction ID: e90ab9cdf5ca85cb761cda2ce8859ba4cc7897ee1d682115b2f9d359ce0e72b7
                                                                                          • Opcode Fuzzy Hash: 0b6f8258533bdfd1b38aae01638bf7f015bed783863309980cde1f96fd0ddcd5
                                                                                          • Instruction Fuzzy Hash: 16317071A04201AFD720DF29C880F6BB7E5FB84714F05496DFA5D9B251E730E905CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 22daeb157ddef898588f5aa86c6cc945e269e12ac12f71cb431f2809365d9b6e
                                                                                          • Instruction ID: 404e822138c4cc84775e9c1cce1db89c73a593cebf2c3e311100744bdfb0163d
                                                                                          • Opcode Fuzzy Hash: 22daeb157ddef898588f5aa86c6cc945e269e12ac12f71cb431f2809365d9b6e
                                                                                          • Instruction Fuzzy Hash: D431D8316016D29BF322975ECE88FE57BDCBF40781F1D00A4AE4E976D1DB28D940C225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 657c0f1e5f1e62ff77837d0b0464d1c1a4c0605f697e8af6a6ce063ebbf2f36e
                                                                                          • Instruction ID: 35e1bd35047928ce7a536cbeebc7e02baec7d1e3c045575421667f6a52588f03
                                                                                          • Opcode Fuzzy Hash: 657c0f1e5f1e62ff77837d0b0464d1c1a4c0605f697e8af6a6ce063ebbf2f36e
                                                                                          • Instruction Fuzzy Hash: 5B31E175E0021AABDB16DF98CC40BAEB7B5FB48B44F454168E908AB284D770ED11CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 01a871d8b0f8ce1b4eddb7df9b2a0371dd6dd4dbe34cd5526f261c2bd0c9007b
                                                                                          • Instruction ID: 1ed6ae5a6b066d090a323cbc670fd6dba829be1b000f73d15e6dd4efe0102ac3
                                                                                          • Opcode Fuzzy Hash: 01a871d8b0f8ce1b4eddb7df9b2a0371dd6dd4dbe34cd5526f261c2bd0c9007b
                                                                                          • Instruction Fuzzy Hash: 85313376A4012DABCB22DF54DC88BDE7BF9AB98750F1501A5E90CE7250DA30DE918F90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 36d061cf6bc13680e4759dfdb6afecb3cd6b86de42529cbf3208199f60a55788
                                                                                          • Instruction ID: 9ef889b616d4f3ee1a972eab07621f2d4005ac69c0e70d98c950b7b3e23d5b4b
                                                                                          • Opcode Fuzzy Hash: 36d061cf6bc13680e4759dfdb6afecb3cd6b86de42529cbf3208199f60a55788
                                                                                          • Instruction Fuzzy Hash: C831A476E10619AFDB21DEBAC840EAEBBBCEF44750F014465E919E7250D7709A008BE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 313d6f5028fbf21de2172e9f29467766f896d27111b77c1e26782bf9275a9ca6
                                                                                          • Instruction ID: f275e1377bfa12d45d76f081023f1a2127040395006ffb01787a85b27bf0ac03
                                                                                          • Opcode Fuzzy Hash: 313d6f5028fbf21de2172e9f29467766f896d27111b77c1e26782bf9275a9ca6
                                                                                          • Instruction Fuzzy Hash: EC31C271B40706ABDB13DF99DC50B6AB7B9AF88758F044069F509EB382DA70DD118B90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fb0d694cabc143e4fd6970c91a75172dfd4f38fc9215e99da0012a664c440d8e
                                                                                          • Instruction ID: e70a417052b3136ce08d2c5024dd570a5f08a56f07fe4a6043691843fe68bda9
                                                                                          • Opcode Fuzzy Hash: fb0d694cabc143e4fd6970c91a75172dfd4f38fc9215e99da0012a664c440d8e
                                                                                          • Instruction Fuzzy Hash: D231F932E04756DBD712DE28C940EABBBA5AFD4250F094929FE5D97310EA31DC0187E2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9eae08bbddf009c4c8cb432230bb14de3da52177352f6232548521054853d315
                                                                                          • Instruction ID: cfb2e2e8b630a60da523afa1beda8bcbb14e47a74bfe6c8426e97a103f4ec93e
                                                                                          • Opcode Fuzzy Hash: 9eae08bbddf009c4c8cb432230bb14de3da52177352f6232548521054853d315
                                                                                          • Instruction Fuzzy Hash: D1319A716093119FE360CF59C840F2BBBE9FB98700F454AAEE98897251D770E848CBD1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                          • Instruction ID: ff6c8be06c6a3abe2f7983f0f15838efdb049593b64cc08b6e4f38c19306cecf
                                                                                          • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                          • Instruction Fuzzy Hash: 8031FAB2B00701AFD765CF6DDE81B5ABBF8AF48650F18492DA59EC3651E630F9008B64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7928ad133854f2515a789302c029ef44d3c646d4dd92cb6d75b2f799a05ab30e
                                                                                          • Instruction ID: 54e144083ae77384c006709d430283cf637286df75f064cb7d64bf3e8f632277
                                                                                          • Opcode Fuzzy Hash: 7928ad133854f2515a789302c029ef44d3c646d4dd92cb6d75b2f799a05ab30e
                                                                                          • Instruction Fuzzy Hash: FE319871909301DFCB12DF19C548A5ABBF5FF89614F0449AEF88C9B311D3309A55CB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cf579d898f6d303d5ccac84bf681bf9ae362241e9fe8762db0c60a61adc5edc3
                                                                                          • Instruction ID: 1936f65c4f3639cd9b544d84b914ae6190de374805dfccb5676236b4316b348d
                                                                                          • Opcode Fuzzy Hash: cf579d898f6d303d5ccac84bf681bf9ae362241e9fe8762db0c60a61adc5edc3
                                                                                          • Instruction Fuzzy Hash: 5431D431B002069FD724EFE9C981B6EBBFDAB84744F008529D54ED7654D730E945CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                          • Instruction ID: 0efcfdbd713582e9085e839f5c6f5658e54fca74d2e49f47875dce5d7337a8a9
                                                                                          • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                          • Instruction Fuzzy Hash: 3E212832E0065BAADB11DBB9C801BAFBBB9EF94740F0584369E19F7340E270D900C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 432a8434d2111bfd205b0055fb98e4eb5701849cd4fcbb2734f73b82dd4c0284
                                                                                          • Instruction ID: 552c61d352854a097bb246fa0584c02fecbeb66aeba95273c5e9a465375e833e
                                                                                          • Opcode Fuzzy Hash: 432a8434d2111bfd205b0055fb98e4eb5701849cd4fcbb2734f73b82dd4c0284
                                                                                          • Instruction Fuzzy Hash: 45313BB55002019BDB21EF6CCC81B7977F8EF91314F548169ED4D9B382EA34D986CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                          • Instruction ID: 1bfb303e523a60932db005c2eb60f4fa7c54703292b28c83ac91fb90fc4bd0e6
                                                                                          • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                          • Instruction Fuzzy Hash: 0D213D3A60065AB6CB15AB95CC00EBBBBB4EFC0B10F40C01EFB9D87691E634D940C760
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 38a35cb55b8519d78fff844953827e72679bd3e251fe84198096e384d4aaea84
                                                                                          • Instruction ID: 3728c9b46b1fc4abb13bb5a219096b717fe50b99952be7023973d373420ddf11
                                                                                          • Opcode Fuzzy Hash: 38a35cb55b8519d78fff844953827e72679bd3e251fe84198096e384d4aaea84
                                                                                          • Instruction Fuzzy Hash: C331E832A0152C9BDB31DF18CC45FEE77B9EB95B40F0104A1EA4DA7290D674AE808F90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                          • Instruction ID: 824ec46475b95dccf343d5f3d886c599d1a1009ce752753719c3ab0eae58e3b4
                                                                                          • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                          • Instruction Fuzzy Hash: 40218375A00609EFCB15CF58C984A9EBBB9FF48714F108065EE199F242D671EE05CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e099b779207f8a65b2a05e59dfff564a3dbf730c2c6fcabc961c78c173d34c0c
                                                                                          • Instruction ID: c512ae1fedabc572e3024f23e4edde239cc07ff9eaa4c42d4a45f3d09222bb18
                                                                                          • Opcode Fuzzy Hash: e099b779207f8a65b2a05e59dfff564a3dbf730c2c6fcabc961c78c173d34c0c
                                                                                          • Instruction Fuzzy Hash: EE21B172A047459BC722DF18C880B6BB7E9FFC8761F004919FD5CAB642D730E9118BA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                          • Instruction ID: 99a0cbaba9183fdd021ac92f8c7028e48800c6379788e110f9e58094e82c0749
                                                                                          • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                          • Instruction Fuzzy Hash: D4318B31600605EFDB21DFA8C884F6AB7F9FF85354F1449A9E55A9B290E730EE01CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8218634e196856740902bb50121b1991dfefa74f83ea9b0eec9b35f7ddb416bc
                                                                                          • Instruction ID: eb0f468d5fd1ead195366bfde981c07a365298e655012a9a50ef956919183a26
                                                                                          • Opcode Fuzzy Hash: 8218634e196856740902bb50121b1991dfefa74f83ea9b0eec9b35f7ddb416bc
                                                                                          • Instruction Fuzzy Hash: 65316D79A00206EFCB15CF18C984AEEB7B9FF84304B15445AF84E9B395E771EA50CB94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 392f125d0c0b70ec03417e20a0c21de1e3e9461b18e30b1fe1be3efdeb6a2c00
                                                                                          • Instruction ID: 7dbfc40dac1308d407915cc8a9b972f989df6290fdf2bbd51502a5a8a4036178
                                                                                          • Opcode Fuzzy Hash: 392f125d0c0b70ec03417e20a0c21de1e3e9461b18e30b1fe1be3efdeb6a2c00
                                                                                          • Instruction Fuzzy Hash: 7121AD75900229EBCF25DF59C881ABEB7F8FF88740F440069F945AB240D738AD52CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0f76ab10179cbb95c07a1f68cd795a26004ea1fc59803b11144fa337ebbc0a79
                                                                                          • Instruction ID: 899dc2808f7ede3c9ca21773b595eaee3fc3eb8a4ef0ae6ed5e44fe9d87b2e7a
                                                                                          • Opcode Fuzzy Hash: 0f76ab10179cbb95c07a1f68cd795a26004ea1fc59803b11144fa337ebbc0a79
                                                                                          • Instruction Fuzzy Hash: 9D21AB75A00645EBD715DF6DC840F6AB7B8FF88B80F180069F948E76A0D634ED00CB64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3db8fd350c57164d0084e3793386ee58af718e7b7c2e7d1989409f2e59f79fe1
                                                                                          • Instruction ID: bbf17126f07410cc39067f5be61900c76ad72c13bc8ddb24dd93f9d4ab5dcbe9
                                                                                          • Opcode Fuzzy Hash: 3db8fd350c57164d0084e3793386ee58af718e7b7c2e7d1989409f2e59f79fe1
                                                                                          • Instruction Fuzzy Hash: 5921AF72904346DBD711EF9AC844B6BBBECAFE1A40F0C045ABDC88B251D734DA04C7A2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 99c08caa37ee51f7aa37411d46897bbe65b05483ece2b662ec08d78db7a520a4
                                                                                          • Instruction ID: 5c3daf720c633ad3d9ac9d1288c15ca3fbd575b2d32670fab90a7c512afc9cd6
                                                                                          • Opcode Fuzzy Hash: 99c08caa37ee51f7aa37411d46897bbe65b05483ece2b662ec08d78db7a520a4
                                                                                          • Instruction Fuzzy Hash: 60210B316056819BE322976D8C04F287B9CBF81B75F1803A4FA69AB6E2D768C901C391
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 92e1010764bf328b6ee65f1799720ebca67dc7e67395eee26d4949f6cd5f4804
                                                                                          • Instruction ID: b9c708f880fa8bef439611353494b60a6a3ac24a2361a48fd161ac6593cec005
                                                                                          • Opcode Fuzzy Hash: 92e1010764bf328b6ee65f1799720ebca67dc7e67395eee26d4949f6cd5f4804
                                                                                          • Instruction Fuzzy Hash: 4E21BE35200601AFC725DF29CD41B4677F5FF48744F188468A50DCBB61E371E942CB94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a411b1503cde73d957c17028c1011e849aea34473f2fee40048f64fb31d5474c
                                                                                          • Instruction ID: fcae763c33badd87150fb9d8742c33f94c6b2cff31facf934c2735ff89015e71
                                                                                          • Opcode Fuzzy Hash: a411b1503cde73d957c17028c1011e849aea34473f2fee40048f64fb31d5474c
                                                                                          • Instruction Fuzzy Hash: 6C112972380B11BFE32296699C45F2F7A9ADBD4B60F11042CB70CDB290EB70EC018795
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 40e1d7d4280fdaad435548ebcabe56ac9bed326085d9b28187d1fd6177327953
                                                                                          • Instruction ID: 7ab528c16254035252c5cf43832f8c96baf7222c77b6a9bf1c1a04663779d3d0
                                                                                          • Opcode Fuzzy Hash: 40e1d7d4280fdaad435548ebcabe56ac9bed326085d9b28187d1fd6177327953
                                                                                          • Instruction Fuzzy Hash: 1E21EBB5E00219ABDB24DF9AD885AAEFBF9FF98600F10012EE409A7240D7709941CB55
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                          • Instruction ID: 5b3427602595b81a349dd352a6d518ecef41e23bb72c4d4f2adae49df446f97e
                                                                                          • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                          • Instruction Fuzzy Hash: 63216D72A00209AFDB129FA8CC40BAEBBB9FF98350F208855F908A7252D734D9509B50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                          • Instruction ID: 8df38bb8c91de84d0e452365362369cd51e4f3b20eb58697faa1eb2a7a13bba1
                                                                                          • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                          • Instruction Fuzzy Hash: 6311E272600605BFE7229F44DC80F9BBBBDEF81754F140029F6099B190D6B1ED44CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4c9337e9b8f67eb8e4f1a475c96dba07896388278a021da9c2f6be22bb9d0c1f
                                                                                          • Instruction ID: 4a8c71a372b21e65a9dd3f99a234915ae4f091f375f3db9374475eb09dfe4910
                                                                                          • Opcode Fuzzy Hash: 4c9337e9b8f67eb8e4f1a475c96dba07896388278a021da9c2f6be22bb9d0c1f
                                                                                          • Instruction Fuzzy Hash: 2D11BF31700611ABEB11CF8DC4C0E26BBE9AF8A751B19806DEE0C9F204D6B2D901C790
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                          • Instruction ID: 0af0d1bdf6ff6cb32d0b59b5a65a68cde9fa55d01fa54083adc22afeda36f47b
                                                                                          • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                          • Instruction Fuzzy Hash: FE216872600641DFD7218F49C940E7ABBEAEFD4B51F19882EE94E97620C730ED01CB80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2d4e23888959ef1473bad3a0efe67b77340e914761112cd18d34c43374b2c502
                                                                                          • Instruction ID: b534e75fbaf399ed4555cc72543fe3a54838113475ec341d12b3cc0ebd01ba8b
                                                                                          • Opcode Fuzzy Hash: 2d4e23888959ef1473bad3a0efe67b77340e914761112cd18d34c43374b2c502
                                                                                          • Instruction Fuzzy Hash: EE219F35A00205DFCB14CF98C581E6EBBB5FB88314F20456ED109A7311D771AD46CBD0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fd36b5baa6bca642e25454c0f1e26abcf2e2e4f05a0f48fae559ad9ade1fa53e
                                                                                          • Instruction ID: 90ad346ffb7952f0376196eddbd69d84951d5f7b5e77bb17b6f86e61ea8d4f07
                                                                                          • Opcode Fuzzy Hash: fd36b5baa6bca642e25454c0f1e26abcf2e2e4f05a0f48fae559ad9ade1fa53e
                                                                                          • Instruction Fuzzy Hash: 39216A75610B01EFE7218F68C881FA6B7E8FF84390F44882DE59EC7251DA30A940CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4fea634c4bc4c3e5eaa0bc8fd300167e95e80127533abdcc352404d5d8f3a2e0
                                                                                          • Instruction ID: 97b83b1d41de18880cd09fe77c6e1a88755318631d4c554fcf9161587390b17e
                                                                                          • Opcode Fuzzy Hash: 4fea634c4bc4c3e5eaa0bc8fd300167e95e80127533abdcc352404d5d8f3a2e0
                                                                                          • Instruction Fuzzy Hash: 98110C367041149BCB1ADB29CC41A6F726AEFD53B4B65452DE92E9B250E9309D02C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 421f5bb7d8e1775a5faf0101572e8aaea4a196d60dff888371b54f5617407f4b
                                                                                          • Instruction ID: befc108ec3e0cdd8d9a2b0deef767087343e644780567247ada9d366dfde65d6
                                                                                          • Opcode Fuzzy Hash: 421f5bb7d8e1775a5faf0101572e8aaea4a196d60dff888371b54f5617407f4b
                                                                                          • Instruction Fuzzy Hash: C511C632240614EFD722DF6DCD40F9A77ACEF99751F118025F609DB261DA70E905C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3b64dd40b146ebd80e5cbc123509030905a76d021a2b0108399ce503568047ef
                                                                                          • Instruction ID: c64369102f4393918065aea6d869ac85f7eeaf8094b8bf8bdec162e0ff87aec1
                                                                                          • Opcode Fuzzy Hash: 3b64dd40b146ebd80e5cbc123509030905a76d021a2b0108399ce503568047ef
                                                                                          • Instruction Fuzzy Hash: AA118F76A01745EFDB25CF59C980E5AFBF8AF94690F154079E90DAB311E630DE01CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                          • Instruction ID: 0b14520fa25f6784c7cfc42d10c47703e7112fe77269d9a3bac371221dfd6784
                                                                                          • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                          • Instruction Fuzzy Hash: F211C836A00915AFDB19CB54C805B9EB7F5EF84350F054269EC55D7380D675BE51CB80
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                          • Instruction ID: faea5ecb57f0832c5b0400911b5e9c48aeb118fe971caca3360e107903b24953
                                                                                          • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                          • Instruction Fuzzy Hash: 852106B5A00B459FD3A0CF29C440B56BBF4FB48B10F10492EE98AC7B50E371E814CB94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                          • Instruction ID: ead17cc3da2ce12dfecde30c5b7bbcceb93f5f6e341b10a34a7b4ba710d7485a
                                                                                          • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                          • Instruction Fuzzy Hash: 11119131601601EFE7219F48C840F5B7FA9EB85F55F05842CEA8E9B260D731DC40D792
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 714de6a45a8f861efedd6dfbc35b8c8d7e80726c9b6dac57b8734ef2e3f20a82
                                                                                          • Instruction ID: 78f3cb7375e4b5788049093f832f992c38a11bde649e43016bf71d18f78144f6
                                                                                          • Opcode Fuzzy Hash: 714de6a45a8f861efedd6dfbc35b8c8d7e80726c9b6dac57b8734ef2e3f20a82
                                                                                          • Instruction Fuzzy Hash: 0D010031606686ABE326A36E9C88F277B9CEF80795F490065F9099B240DA24DC00C2F2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2be48140b5689a0c2cdb69a40a3d7916ad1ced68a6e44b69356f4f896214a9c0
                                                                                          • Instruction ID: 954046ef489533b7a18abc990601b028c22e3d5255dec1f3522db40d15bf77aa
                                                                                          • Opcode Fuzzy Hash: 2be48140b5689a0c2cdb69a40a3d7916ad1ced68a6e44b69356f4f896214a9c0
                                                                                          • Instruction Fuzzy Hash: B611E136241645AFDB26CF5DD940F567BA8EB86B69F00452AFA0C9B350C370E842CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ef809955d45d00df8172a44b10f02a1ff1dbd0dabc834b6de26ad34b3ccda471
                                                                                          • Instruction ID: b98cbc43063eff84bbfb695cf08662333e6af1f0f30dd029040ed4c7b9d49c78
                                                                                          • Opcode Fuzzy Hash: ef809955d45d00df8172a44b10f02a1ff1dbd0dabc834b6de26ad34b3ccda471
                                                                                          • Instruction Fuzzy Hash: 31118676900B15ABEB21EF59D980F5EFBB8EF84751F910459DA09B7200D730AD018B50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7db126b229a20cd62b23421d96bfe7fce9feb06d757db513cc199909dc2e9d44
                                                                                          • Instruction ID: 9a974ac936701a12eca98892502c3d9a162f5f980f1f563117280884a7aed91b
                                                                                          • Opcode Fuzzy Hash: 7db126b229a20cd62b23421d96bfe7fce9feb06d757db513cc199909dc2e9d44
                                                                                          • Instruction Fuzzy Hash: D20180799001099FD725DB1DD848F26BBEDEBD5319F20816AF1098B260C770DC46CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                          • Instruction ID: e879119dc33f8b7d0c383b9852558e82c2be802e6910b74b57a3aec2feeb907b
                                                                                          • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                          • Instruction Fuzzy Hash: 0211E9752016C59BEB23D71CC554B6977ACEB80785F1904A1ED4D97652F328C946C3A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                          • Instruction ID: e44cb300303c143574b56687ca1c83ca5883a90b9092a7fe734b8a65ae1199fe
                                                                                          • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                          • Instruction Fuzzy Hash: 06019232600105AFEB21DF58C801F5A7EADEB85F55F058428EA8E9B260E771DD40C791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                          • Instruction ID: 336f968d334e7c174b103cbf450c9e139d0c7ad0e04432fe3107af0f114cebe2
                                                                                          • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                          • Instruction Fuzzy Hash: 4A0126354047219BCB318F19D840A367BE9EF957617008A2DFCDDCB281C335D400CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fb380a067ff911a02bb146fc96abe1cd03c0ca0b304092f886953e22101ceccd
                                                                                          • Instruction ID: 867c23b1a6d9a3d0c649edcbbefe004c83816d47a25a5b1d6e5b9c5557c921dc
                                                                                          • Opcode Fuzzy Hash: fb380a067ff911a02bb146fc96abe1cd03c0ca0b304092f886953e22101ceccd
                                                                                          • Instruction Fuzzy Hash: AE11A132241241EFDB15EF19CD80F967BB8FF94B44F200065FD099B651C235ED01CA90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 33a9137d96746aaca1b09f3a7134da7b466747de9e7f01643222d1dbf6fa2e20
                                                                                          • Instruction ID: 708f414abb5001640cec628ab9a8499b469ed7109f31e838c1e7d326cb9cb90c
                                                                                          • Opcode Fuzzy Hash: 33a9137d96746aaca1b09f3a7134da7b466747de9e7f01643222d1dbf6fa2e20
                                                                                          • Instruction Fuzzy Hash: 7D115A71642229ABDB25EF64CC42FE9B3B8AF45710F504194A31CA60E0DB709E81CF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                          • Instruction ID: 337d075bc42a86ef28265486efca6e8e36c51f94658fb2a95110357959946c45
                                                                                          • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                          • Instruction Fuzzy Hash: 0701F5326002008BEF159B1DE880F92BBAABFD4700F1545A5FD09CF246EA71C881C390
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a206224dd59282bae84e2c6553b52cf7a427ef4b78431a4d49668473f5ab16bf
                                                                                          • Instruction ID: 3d8b79b30d392473f98b0a2e418ea8c7e84748c75b3ec5f5e76320a42d716fc4
                                                                                          • Opcode Fuzzy Hash: a206224dd59282bae84e2c6553b52cf7a427ef4b78431a4d49668473f5ab16bf
                                                                                          • Instruction Fuzzy Hash: 22112D77900019BBCB11DB95CC84DDF7B7CEF48254F044166E90AE7211EA34EA15CBE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 13395eeb40c37b6aedb0dd1d8cf82932622f69474ffcc57d5c5b0c311f514432
                                                                                          • Instruction ID: 25d678d61562f717d2dc255dee6ae8a0d2348938c08e974405b7259130b90477
                                                                                          • Opcode Fuzzy Hash: 13395eeb40c37b6aedb0dd1d8cf82932622f69474ffcc57d5c5b0c311f514432
                                                                                          • Instruction Fuzzy Hash: 2711A1366441469FD711CF58D800BA6BBB9FB9A314F48C159E8498B316D732EC85CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 87b46a42ce149f89b3bd5266660506c98e2f45e61e630bdc3b1be74b9fcfd0b2
                                                                                          • Instruction ID: cbb3468cf1a915b969803ae0ecf84e3bdd2d3ee729343a25b775d9f1e11c4017
                                                                                          • Opcode Fuzzy Hash: 87b46a42ce149f89b3bd5266660506c98e2f45e61e630bdc3b1be74b9fcfd0b2
                                                                                          • Instruction Fuzzy Hash: 3B11E8B1E002199BCB04DFA9D541AAEBBF8FF58750F10406AB909E7351D674EA018BA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f4d2867373de0e44b6f3957b3af013cf2b2f24b89681432661c7ef19bd6703b8
                                                                                          • Instruction ID: 67f9c11cde9be6cfa78e4ff9f24fadffd2d4cde54037ffef280efd7b80b11c74
                                                                                          • Opcode Fuzzy Hash: f4d2867373de0e44b6f3957b3af013cf2b2f24b89681432661c7ef19bd6703b8
                                                                                          • Instruction Fuzzy Hash: 05017131540211ABCB33EF19C448E76BBEDFF92695B45442EE94E6B611CB219C42CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ecdbbeddb31829f24135fd366bd93297aa2a1d8e0c4279f67f4d832513210586
                                                                                          • Instruction ID: f1bca5e9684f6494c5fc096fcf398c49ee279f3f6534ea1f51fbdf86e98d9deb
                                                                                          • Opcode Fuzzy Hash: ecdbbeddb31829f24135fd366bd93297aa2a1d8e0c4279f67f4d832513210586
                                                                                          • Instruction Fuzzy Hash: 19118075A0120DAFCB05EFA4C851FAE7BBAFF84740F104059F90A97290E635EE11CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                          • Instruction ID: 9eccc6d3b3a8f41f71e771598f2598506285ad89debea7cf5b17bf331cba8d8c
                                                                                          • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                          • Instruction Fuzzy Hash: 7801F932100B459FEF229AAEC440E67B7EDFFC5350F04481AA59A87544DA70F401C761
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9be260a2f88bfc0d41a9e6464c7883909d24d1959ec92cbbb742e9fce7e08d0c
                                                                                          • Instruction ID: 24a2566cfa9be89d686330d3763857134a1cf1361cd69985a449a1018f9aed09
                                                                                          • Opcode Fuzzy Hash: 9be260a2f88bfc0d41a9e6464c7883909d24d1959ec92cbbb742e9fce7e08d0c
                                                                                          • Instruction Fuzzy Hash: E60184B1611505BFD351AB69CD80E57BBACFFD9694B000525BA0D93551DB24EC01C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7cffd14ed4b167bc85b17382951473674ae96415f7e048a2bae4c27fa6f37e4f
                                                                                          • Instruction ID: 0105587dddefa0b662c27f91e301705c4fcd12b0e5aa83aec72b9c6989dbef69
                                                                                          • Opcode Fuzzy Hash: 7cffd14ed4b167bc85b17382951473674ae96415f7e048a2bae4c27fa6f37e4f
                                                                                          • Instruction Fuzzy Hash: B401FC322142129BD320EF6AC849AA7BBACFF98760F118529F99D87180E730D905C7D2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 966c338b9cb44bfc548fef3f1ef8f78fba50554016d4fb0815d1739842ca639f
                                                                                          • Instruction ID: 8c4bb705253a7d85c6d4aa51cc70eb78808490e2cd3b13bab723b5a60bda5bae
                                                                                          • Opcode Fuzzy Hash: 966c338b9cb44bfc548fef3f1ef8f78fba50554016d4fb0815d1739842ca639f
                                                                                          • Instruction Fuzzy Hash: 0E115E75A0020DABDB15EF64C851EAEBBB9EF88B40F008059FD4997380DA34D911CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ffef37f68ba1582d156bdd6fd3d5107b95b8217b6ebea17c3d3f93ef0dc81a16
                                                                                          • Instruction ID: d01633377ee78054c6a12a9860e5c95fa96a8f766ffa5a3d677ec610243b0f83
                                                                                          • Opcode Fuzzy Hash: ffef37f68ba1582d156bdd6fd3d5107b95b8217b6ebea17c3d3f93ef0dc81a16
                                                                                          • Instruction Fuzzy Hash: 9A1139B16183099FC700DF69D442A9BBBE8EF98750F00491EB998D7391E630E901CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                          • Instruction ID: b5e4061fd305c04a3e3c086df77e8cf942c399a4866e0f8845671f7a3d352b88
                                                                                          • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                          • Instruction Fuzzy Hash: 5301D433200A059FE721DB6DD844F96BBEAFBCA710F094819E6428B658DBB0F841C794
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bf246d0ecdc3a980b4f892c5629a6ae2afaf550c58f7186235b8d48580784927
                                                                                          • Instruction ID: cb83ad54686fffd86b053fff58f268a4b20c3bee04b4bbe4a011d6b97ad135d3
                                                                                          • Opcode Fuzzy Hash: bf246d0ecdc3a980b4f892c5629a6ae2afaf550c58f7186235b8d48580784927
                                                                                          • Instruction Fuzzy Hash: B1113C716143059FC710DF6DD445A5BBBE8FF99750F00451EB998D7350E630E901CB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                          • Instruction ID: ba6e7a79d3f11e12ed9b69f61eeee777aeb4ab0531c5cb28a5872024a3e25f22
                                                                                          • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                          • Instruction Fuzzy Hash: 39017C32204580DFE722CA2DC948F36BBECEB84755F0904A5F90DDB691D629DE40C721
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 27be34eb6a7794242250e6cfa355750e35f5828063952c135dab9ccfa863b499
                                                                                          • Instruction ID: 1c05e0d4f2d906f4a15cc4c6e60e7f5aac812e309ac33140b991e753aef17c51
                                                                                          • Opcode Fuzzy Hash: 27be34eb6a7794242250e6cfa355750e35f5828063952c135dab9ccfa863b499
                                                                                          • Instruction Fuzzy Hash: B4018F31B10609EBDB14EB6ADC05AAAB7EDEFC0650B154129B909A7644EE20D902C692
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2db55117c50c5c63757913a1de513521c2ed3f7e3668bbaad464345479facdbe
                                                                                          • Instruction ID: 954d891ae5a0f8a82d668f5b93438b3f31cf2a3ce3ff2d40abf6fb60562a3372
                                                                                          • Opcode Fuzzy Hash: 2db55117c50c5c63757913a1de513521c2ed3f7e3668bbaad464345479facdbe
                                                                                          • Instruction Fuzzy Hash: 3B01A271244701AFD732DF1AD844F16BAE8EF95B50F15482AB60E9F390D6B0A841CB54
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 303192a84379ac2701f251f59217d3401682c3bd12ad759a000a63d9994b6a29
                                                                                          • Instruction ID: 5d93b2cc9e39a3e21b60ff8ec06940ca8e8221fc321ee771b47b9cffc9dd941c
                                                                                          • Opcode Fuzzy Hash: 303192a84379ac2701f251f59217d3401682c3bd12ad759a000a63d9994b6a29
                                                                                          • Instruction Fuzzy Hash: 75F0D632651710B7C731DB5A9C40F07BBADEBC4B90F014028BA0997600C630ED01CBE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                          • Instruction ID: b6b4f5dac6f5627b3067a56065aee97a99c3b24ea6d99f8974b831773e996fb9
                                                                                          • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                          • Instruction Fuzzy Hash: EBF0C2B2600611ABE325CF4DDC40E67FBEEDBD1A80F058128A549D7220EA31ED05CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                          • Instruction ID: 3d657e040773749c3292d65be1f3a1b3cb090308b91f085b5437a8c1a719ae87
                                                                                          • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                          • Instruction Fuzzy Hash: 23F0F633204E23ABDB32565D8840F2BAA998FD1BA5F1A0037E60DBB200CE709D0297D1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                          • Instruction ID: 778a86316e885460aefbd1bfc78e16c31d9c6a0081e5427834a4261f5c71de7d
                                                                                          • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                          • Instruction Fuzzy Hash: 7101F432200A86DFDB26E71EC949F99BBDDEF95B51F0844A5FE0C9B6A1D678C900C311
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e3b5d2f8dfba20c4ba8cbb4d870ecb41d07f9b0e9dc8e5857e3874f9c09d80ee
                                                                                          • Instruction ID: 00ec358aa2d7a3e4ea9eb13b55bfe922b5b0f8b53808e5c158265361c6b7b126
                                                                                          • Opcode Fuzzy Hash: e3b5d2f8dfba20c4ba8cbb4d870ecb41d07f9b0e9dc8e5857e3874f9c09d80ee
                                                                                          • Instruction Fuzzy Hash: 5F014F71E012599BDB04DFA9D845AEEBBF8BF58710F14405AF905E7280D774EA02CBA8
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                          • Instruction ID: f09691fbc0dbbecfcb64bf3abe109fe086d1a6b07c6350109edfc172ddc73807
                                                                                          • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                          • Instruction Fuzzy Hash: 9CF01D7220001DBFEF019F95DD80DAF7B7EEB997D8B104129FA15A2160D631DE21ABA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 90e7d9c373e4f9cd8769edbd753bc0e6580a92f12c89789b9022df7748d29eee
                                                                                          • Instruction ID: 41d757d190606ddb7f41c1c23d11e5ae1b43f647e84e7d56e139bf40bf5f8007
                                                                                          • Opcode Fuzzy Hash: 90e7d9c373e4f9cd8769edbd753bc0e6580a92f12c89789b9022df7748d29eee
                                                                                          • Instruction Fuzzy Hash: 2101893650024DABCF129E84DC40EDE7F66FB4CB54F058205FE1866220C332D971EB81
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: feafbf23d311970889b72a8ab61b343470bbc50ce8d21cfc7ad34b098f4179b5
                                                                                          • Instruction ID: 2a535601c6a87e49d37866b70d111e87ea79122a66219c4821976fd0dbcde3fb
                                                                                          • Opcode Fuzzy Hash: feafbf23d311970889b72a8ab61b343470bbc50ce8d21cfc7ad34b098f4179b5
                                                                                          • Instruction Fuzzy Hash: 01F024723047425BF71496999C11F3273DAF7C0752F65806BEB0D9B2C5E970EC418394
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6eeb03c2673e5a9bfeb452466fa372b67685e504edd9ad15c4190d4d9919b2b2
                                                                                          • Instruction ID: 97ed0d97cb94c4e77999f7fcc2f4c9c0c6f7fe814cbe4e996ba0f5a66fa09683
                                                                                          • Opcode Fuzzy Hash: 6eeb03c2673e5a9bfeb452466fa372b67685e504edd9ad15c4190d4d9919b2b2
                                                                                          • Instruction Fuzzy Hash: F201A470601A82DFF322D72CCE48F6937A8BF80B40F480590BA0A9B6D6D728D501D614
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                          • Instruction ID: 94a1d5ce69d713421e93fb194254a1fd8e26bae72cecb1c3244ff15e86c489a2
                                                                                          • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                          • Instruction Fuzzy Hash: 01F0E93538191357E777AE2DC928B2EA6DD9FD0942B15252C964DCB640DF20E80087A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 73cb50246d080ffd28603016ae9b415cc376b9a4fdfa112e2f4d5be2e8a01bb7
                                                                                          • Instruction ID: b24695dfb95936b0559929e11abfcad60d63e577aed5c35a83c0b156162880da
                                                                                          • Opcode Fuzzy Hash: 73cb50246d080ffd28603016ae9b415cc376b9a4fdfa112e2f4d5be2e8a01bb7
                                                                                          • Instruction Fuzzy Hash: C7F0AF706053049FC310EF68C842A1BBBE4FF98750F40465EB89CDB390E634EA01CB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                          • Instruction ID: de0b3139ce88c6ea88b10147caf500e85f23ec16961e4c7a2fe09c3059c6c0d6
                                                                                          • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                          • Instruction Fuzzy Hash: 7CF05432B115119BD331DA4DCC80F17BB6CEFD5E60F590469AA4D9B260C760EC01C7D2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                          • Instruction ID: 5e2674df8a67906b37b2575553c26fab7c2c34504bc357d601e9d94a8ea8d51b
                                                                                          • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                          • Instruction Fuzzy Hash: E4F024B2610204AFE314DB21CC05F86B6E9FF99300F188078A949D7260FAB1ED00C654
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7ab0e14688fea0e64e175fa6a60b65f60cb31a97402c20dd9fa94162917e84a9
                                                                                          • Instruction ID: 088fb0a147dfb27a7425105384d29c50f17c9db63b6fc99cbbf5e086122131ae
                                                                                          • Opcode Fuzzy Hash: 7ab0e14688fea0e64e175fa6a60b65f60cb31a97402c20dd9fa94162917e84a9
                                                                                          • Instruction Fuzzy Hash: 75F04F70A012499FCB04EFA9C515A9EBBB4EF58700F108159B959EB385DA34EA01CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 966f546dbef8f813be26df7ed3c8ab67cda03a1e3d12fcfc9b2f00e3de178cf6
                                                                                          • Instruction ID: 7a62e5804e02fc1074567f450413a40d2a315b65c550f06d1a60572970b7f5f8
                                                                                          • Opcode Fuzzy Hash: 966f546dbef8f813be26df7ed3c8ab67cda03a1e3d12fcfc9b2f00e3de178cf6
                                                                                          • Instruction Fuzzy Hash: 8AF0BE319167E59FF732CB6CC144F61BBDC9B00622F08896AD98D87B42C735D880CB52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5faff31c20e3b0892552a296a2a411511806b24511a2df245d386922d24b5f30
                                                                                          • Instruction ID: 624fee2408938210621cd2b2bc1a5eb47f7f21d744d4c0023eafbd9dd60b5b52
                                                                                          • Opcode Fuzzy Hash: 5faff31c20e3b0892552a296a2a411511806b24511a2df245d386922d24b5f30
                                                                                          • Instruction Fuzzy Hash: 65F05C2F419BC026CF335B3C7EA03D16F65A781260F0A1089F5BCD7245C6748583C320
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8a9fa190f97f629837d434e408cc933644c301fde1cf88ce19831ff21b8932a0
                                                                                          • Instruction ID: 2d3cf4a89e88dcecfba17cb2edd58ad124ee4ff7d17c7ca9900df889ec6ab18f
                                                                                          • Opcode Fuzzy Hash: 8a9fa190f97f629837d434e408cc933644c301fde1cf88ce19831ff21b8932a0
                                                                                          • Instruction Fuzzy Hash: ACF0E2B15116579FE322D71CC1C8B55BBDCAF447A2F099865D90E87552C360E880CA50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                          • Instruction ID: 4dc5aaf116c4ac363edab185ff0b6952a5ab7d56effe4bf74a1ce96f29ab223e
                                                                                          • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                          • Instruction Fuzzy Hash: 89E0D8723006412BE712AF598CC4F57776EDFD2B14F05007AB9085F252CAE2DC09C2A4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                          • Instruction ID: 90f82bec4a5c42421e2076e4f9be3d9a9e1abea3533501c2716f86688dc1dfd7
                                                                                          • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                          • Instruction Fuzzy Hash: C4F03072154204AFE3218F4AD944F52BBF8EB45365F46C425E60D9B561D379EC40CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                          • Instruction ID: 8caea3fc21dd38e91af3c100a8140f2b9bb6a2d70e2d5e9f1a8752b78e219d09
                                                                                          • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                          • Instruction Fuzzy Hash: F7F0E5392043459BDB16DF1AC440ED57BA8FB41350B040454FD4A8B341E735EA81CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                          • Instruction ID: 92eb61ad409f21b7efa5651f318365f158e3f3b2b2841b017bc5ad11a9cf4083
                                                                                          • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                          • Instruction Fuzzy Hash: 9BE0D832654185ABD3267A598800F6A77A9DFD07A1F160429E60C9B162EB70DC40D7D8
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                          • Instruction ID: 2705b66f96e81d6d337b9b7bce13df160ded90d34bbfe8000a2c6b3a0c8638d2
                                                                                          • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                          • Instruction Fuzzy Hash: B5E0D832640214BBDB229759CD05F9A7EBCDBA4E90F050055B604E7090D530EE00D690
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: aa14407a0246cf8b5d3c8f150281784d2e5a9d6ff1374dd6fb10e8d0a8dc54a4
                                                                                          • Instruction ID: dadec67b3b6397616a40e4a689fa1a6e1fbe67ab136d146b781d9ea884188686
                                                                                          • Opcode Fuzzy Hash: aa14407a0246cf8b5d3c8f150281784d2e5a9d6ff1374dd6fb10e8d0a8dc54a4
                                                                                          • Instruction Fuzzy Hash: 91E09232100954ABC322FF29DD01F8A779AEFA07A0F014525B11957190CB30A910C794
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                          • Instruction ID: d534047f53909892689ea7c0ecd7267fbd7dd5bda39311f21aa92724f60bce0e
                                                                                          • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                          • Instruction Fuzzy Hash: C2E09231010612EFE732AF2AC808B56BBE9BF90B52F148C2CA19E124B0C77598C0CB40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                          • Instruction ID: 684c45d67c3278a8a5dcc4f6e507938b3eed5c9a550809257d868e91208f2266
                                                                                          • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                          • Instruction Fuzzy Hash: 9FE0C2343403058FE715CF19C050B627BBABFD5A11F28C068A9888F205EB32E842CB41
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fde021bbe232a91cb94080529d2dd2c1909ffd4918bb90faf8ab079f83c72755
                                                                                          • Instruction ID: 7426ae33e9e69bb5cd7ac79988f260fbc50a28944f05fbc14e703900f3f6ec47
                                                                                          • Opcode Fuzzy Hash: fde021bbe232a91cb94080529d2dd2c1909ffd4918bb90faf8ab079f83c72755
                                                                                          • Instruction Fuzzy Hash: 52D02B324810627ACB7AF1187C04F933A5D9F80321F064860F50CA2021D564EC8193D4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                          • Instruction ID: 7750171b6987012134c246e5ddbc1591549ebe9c15152f391ff3a917697de007
                                                                                          • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                          • Instruction Fuzzy Hash: 79E08C32401A10EFDB322F29DC00F5276A9FBD4B91F214A29F08E160A886B4A881CB44
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f79cd9cbdde1663e2d939c0a2b4881cf593616fa944a0e1e006ebc2fe00b9763
                                                                                          • Instruction ID: 4412125d242d7258e0563a33f9879c05976f111714f25606e50971e243ce10b6
                                                                                          • Opcode Fuzzy Hash: f79cd9cbdde1663e2d939c0a2b4881cf593616fa944a0e1e006ebc2fe00b9763
                                                                                          • Instruction Fuzzy Hash: 42E0C2321004506BC312FF5DED01F4A739EEFE47A0F000121F55897290CB20AD01C7A4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                          • Instruction ID: 8c45d3227d1bf5c642bb44b77d67973f24cc90153364efb0f3cd81086e84dbc9
                                                                                          • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                          • Instruction Fuzzy Hash: 18E08633511A1487C728EE18D515B7277A8EF45720F09463EA61747780C534E544C794
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                          • Instruction ID: cb3ad914b1a6d0f5e207b902aa7728c77dd0ac88528d756acfe527aab5a53430
                                                                                          • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                          • Instruction Fuzzy Hash: 5BD05E36511A50AFC7329F1BEA00C13BBF9FBC5B51705062EA94983920C675A806CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532052892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 005aa1a9355414f3a12429ce7ab098b8187bb15b7130122fab01a4847116c164
                                                                                          • Instruction ID: a85fa2c2e0ed940b7f3a1964a94cd656819bd7c32ecadaf81e60066b16622562
                                                                                          • Opcode Fuzzy Hash: 005aa1a9355414f3a12429ce7ab098b8187bb15b7130122fab01a4847116c164
                                                                                          • Instruction Fuzzy Hash: C5C08C37F5705CAACA20CE5D74811B4F330E683622F112AE2DD8CF30008813E05A4699
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                          • Instruction ID: f9db0526eb8926f968e882347c88b930fbd02ebd635b0b9b014d0ad764d3543d
                                                                                          • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                          • Instruction Fuzzy Hash: AED0A932A24620ABDB72AA1CFC00FC333E8BB88761F060459B508C7150C360AC81CA84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                          • Instruction ID: c728f72d492782976e92a71c07e9f42f845facc783841515fbaac5d795ef5dd1
                                                                                          • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                          • Instruction Fuzzy Hash: 09E0EC359506849BDF56DF99C680F9ABBB9FB94B40F150054A50C6B660C624A900CB40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                          • Instruction ID: a4395eca186dcfcdb02681973f7e5a5c1c35abecee95c5607ea0550c59f9c09c
                                                                                          • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                          • Instruction Fuzzy Hash: 3AD0223222603093CB289695A800F63AA09EBC1AD0F0A002C380EE3800C0048C42C2E0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                          • Instruction ID: 302f54043d78046d8abbcc0980d31e0e20f78a7cc38966ca9130932ee5db6d07
                                                                                          • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                          • Instruction Fuzzy Hash: F6D012371E054DBBCB11DF66DC01F957BA9E7A4BA0F444020B908875A0C63AE950D684
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0cdde8f58cb8fb0c454eacec4b254e28c0a0e31907c0e8d01e5514d6b7105409
                                                                                          • Instruction ID: 2c5a947b068a194748fdc8da4be9989c03f3b8ce43442a9cf28a2c9716b8f246
                                                                                          • Opcode Fuzzy Hash: 0cdde8f58cb8fb0c454eacec4b254e28c0a0e31907c0e8d01e5514d6b7105409
                                                                                          • Instruction Fuzzy Hash: E1D0A734515402DBDF1FEF08CA50E6E3F79FF14A82B40006CEB0851020E328DD01C710
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                          • Instruction ID: 5e4d49e1d32f10e8ee0f6ebf078602efb0083fcbe66ed794212c16eaed937bc8
                                                                                          • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                          • Instruction Fuzzy Hash: 1FD0C935612E80CFD76BCB0CC5A4F1573B8BB44B85FC90890F809CBB22D66CD944CA40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                          • Instruction ID: 885398c4010adaa390e4779d68ce2139ed00fb43aa47458574604fdbac6bf410
                                                                                          • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                          • Instruction Fuzzy Hash: 9BC01232150644AFC711DA95CD01F0177A9E798B40F000021F60447570C531E910D644
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                          • Instruction ID: 882bee54450451e8c3068ae5d15c2fe433ee967b5a5393c6260ad1192a8df49c
                                                                                          • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                          • Instruction Fuzzy Hash: 37D01236100289EFCB05DF41C890D9A772AFBD8710F148019FD19076108A31ED62DA50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                          • Instruction ID: 9da913adf343b8a1c8835a8e70ed330772716711c340ab11fcb84695f77e594b
                                                                                          • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                          • Instruction Fuzzy Hash: 5EC04C757015418FCF15DB1ED294F5577F4F744741F150890E849DB721E624E901CA10
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                                                                          • Instruction ID: a88772c7ab1f442141979c665a529fb07c3abbc37231859259e7a7fb319fdcf8
                                                                                          • Opcode Fuzzy Hash: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                                                                          • Instruction Fuzzy Hash: 03B01232212545CFC7026720CB00B1832ADBF417C0F0900F0650489830D6188910E501
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4ddbdb021037fff1f2c60af7fa68926c86803bd5d82f5966653552a170f73183
                                                                                          • Instruction ID: 15c7acd5b11d570d21730cb526b25bf147317087646aa8a304196ea5d89f5723
                                                                                          • Opcode Fuzzy Hash: 4ddbdb021037fff1f2c60af7fa68926c86803bd5d82f5966653552a170f73183
                                                                                          • Instruction Fuzzy Hash: BE900231606904129640715C48885468049A7E1301B55C015E0468554CCA198A565365
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 695ebc08d1c8f86545aff07bb7c1eb0880e49a7cfadf4e1d1ea0cc72cc4cf066
                                                                                          • Instruction ID: e6676f752524245afa074b5e2ad41222c63855ef8001d826f743b435feedeb88
                                                                                          • Opcode Fuzzy Hash: 695ebc08d1c8f86545aff07bb7c1eb0880e49a7cfadf4e1d1ea0cc72cc4cf066
                                                                                          • Instruction Fuzzy Hash: 16900261602604424640715C4808406A049A7E2301395C119A0598560CC61D8955936D
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d96483a707303aef3b2e71256be1dd7cc35acda7b3c3a606225cf03e33b9c027
                                                                                          • Instruction ID: 0169064238cb9647f414b8e03a633741f2e991849ef0932ea8c95676e91afac7
                                                                                          • Opcode Fuzzy Hash: d96483a707303aef3b2e71256be1dd7cc35acda7b3c3a606225cf03e33b9c027
                                                                                          • Instruction Fuzzy Hash: 1690023120250C02D604715C4808686404997D1301F55C015A6068655ED66A89917235
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fffb52025e7653f283f9d1cee3a0a2d1a44176f16cab8b662503c2e0948db5f0
                                                                                          • Instruction ID: 173327538a0634fc9105b13cd2c96b1f99a6d4ee75db0bf738a41889455fbe50
                                                                                          • Opcode Fuzzy Hash: fffb52025e7653f283f9d1cee3a0a2d1a44176f16cab8b662503c2e0948db5f0
                                                                                          • Instruction Fuzzy Hash: 3390023160650C02D650715C4418746404997D1301F55C015A0068654DC75A8B5577A5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 145335202b7644b2a359fee8c20a83a8a0ead51d7f3e19eeac8537f5dc04c165
                                                                                          • Instruction ID: 0d111851fa7defb2a97189bc28d3caf752fb00978e9f8c7af448f26eb5892192
                                                                                          • Opcode Fuzzy Hash: 145335202b7644b2a359fee8c20a83a8a0ead51d7f3e19eeac8537f5dc04c165
                                                                                          • Instruction Fuzzy Hash: 1890023120654C42D640715C4408A46405997D1305F55C015A00A8694DD62A8E55B765
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7c3603e315a3efe61741351360e28b42f59770493122479cbccf746ff1bc8752
                                                                                          • Instruction ID: 3457a98bafde07c091218c243709e8452e9c68136044e78399e2d2eeca1d8db0
                                                                                          • Opcode Fuzzy Hash: 7c3603e315a3efe61741351360e28b42f59770493122479cbccf746ff1bc8752
                                                                                          • Instruction Fuzzy Hash: 8D9002A1202644924A00B25C8408B0A854997E1201B55C01AE1098560CC52A89519239
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fa49ae86cead1630175447be0955127b0cca027230010367f62603c741d372a2
                                                                                          • Instruction ID: e2d5a1a6a13c2f335221cde8566fb97f36db5d0d00211575453c563934e37fc5
                                                                                          • Opcode Fuzzy Hash: fa49ae86cead1630175447be0955127b0cca027230010367f62603c741d372a2
                                                                                          • Instruction Fuzzy Hash: 9E900225222504020645B55C060850B4489A7D7351395C019F145A590CC62689655325
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 11c8b6be647d3e2100ff7e97cb0a068accfe07c91dc1e2d639c2d323008cf3b1
                                                                                          • Instruction ID: 21c6acc9ac5f16c626464969d4fbeea964de491e45d24198618eda2edfe7ec4a
                                                                                          • Opcode Fuzzy Hash: 11c8b6be647d3e2100ff7e97cb0a068accfe07c91dc1e2d639c2d323008cf3b1
                                                                                          • Instruction Fuzzy Hash: 8C90023124250802D641715C4408606404DA7D1241F95C016A0468554EC65A8B56AB65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9e1739d064af110382d7bd7f9d25da0b40217d8f04656dc74f45d42a9fa34675
                                                                                          • Instruction ID: 496ba9f708576c881c20d3fae045fbb1ea0ef6adaf4138e04b8d6460f18f5096
                                                                                          • Opcode Fuzzy Hash: 9e1739d064af110382d7bd7f9d25da0b40217d8f04656dc74f45d42a9fa34675
                                                                                          • Instruction Fuzzy Hash: 8490022120654842D600755C540CA06404997D1205F55D015A10A8595DC63A8951A235
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 11a993caac701af5e63f7048958689c1e72c9bd6f5dea3bdf91c34cf520d5240
                                                                                          • Instruction ID: b5f623617930c263f7806f982d2494613faaad15cea089765b15208676f337e3
                                                                                          • Opcode Fuzzy Hash: 11a993caac701af5e63f7048958689c1e72c9bd6f5dea3bdf91c34cf520d5240
                                                                                          • Instruction Fuzzy Hash: 0D90022160650802D640715C541C706405997D1201F55D015A0068554DC65E8B5567A5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: afb08cc5455f3bf5f7661182dd52bd09a8c7fd1c7c9fe7b8ab80cfd5ed57478b
                                                                                          • Instruction ID: e9903794a9a480cb896340374a5dc7c194dadf1083ef84ccf4471578e959c331
                                                                                          • Opcode Fuzzy Hash: afb08cc5455f3bf5f7661182dd52bd09a8c7fd1c7c9fe7b8ab80cfd5ed57478b
                                                                                          • Instruction Fuzzy Hash: 5690023120250803D600715C550C707404997D1201F55D415A0468558DD65B89516225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8500e2feb4f18526b734164136c5ee95a16bf6d5d44034bf3c0190f9580bfeae
                                                                                          • Instruction ID: 08d960f7ac365a818951149621c77d15453d3692c835dcf1a7ab7d4c520b887a
                                                                                          • Opcode Fuzzy Hash: 8500e2feb4f18526b734164136c5ee95a16bf6d5d44034bf3c0190f9580bfeae
                                                                                          • Instruction Fuzzy Hash: 6990023120250C42D600715C4408B46404997E1301F55C01AA0168654DC61AC9517625
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 027af7b843b52d92152b4b210eef3ddbdc50c95c5ed8269ed6fbbc1bfd342f9f
                                                                                          • Instruction ID: e890f903d4b607e7d49825edff591b58f1bc00d5449cae06ba5184fa47a9af10
                                                                                          • Opcode Fuzzy Hash: 027af7b843b52d92152b4b210eef3ddbdc50c95c5ed8269ed6fbbc1bfd342f9f
                                                                                          • Instruction Fuzzy Hash: 6190023120290802D600715C480C747404997D1302F55C015A51A8555EC66AC9916635
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 640a48c9910c74a430f2bfbad92b2ebaefc4fefb4b82e6cdf1d64e296a8218f2
                                                                                          • Instruction ID: 678ec15efd0fe428a1bf19fe8f89cc460a6b9a936cb4dca33afc8a346bfb8a0c
                                                                                          • Opcode Fuzzy Hash: 640a48c9910c74a430f2bfbad92b2ebaefc4fefb4b82e6cdf1d64e296a8218f2
                                                                                          • Instruction Fuzzy Hash: F490026121250442D604715C4408706408997E2201F55C016A2198554CC52E8D615229
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cd9c3ac54b7e8debbda896d21ea7c8c5aa3588a7e39ecf87a38c298ab2e104be
                                                                                          • Instruction ID: 89dc8afa898a7d7a9c4117e99b9a9157db9290c8a814b727e0e409dcb19e3ad9
                                                                                          • Opcode Fuzzy Hash: cd9c3ac54b7e8debbda896d21ea7c8c5aa3588a7e39ecf87a38c298ab2e104be
                                                                                          • Instruction Fuzzy Hash: 6D90026120290803D640755C4808607404997D1302F55C015A20A8555ECA2E8D516239
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d33b116caec23ef52018c3b63203c760e4c01ccea5a51dcde48a99424eba862b
                                                                                          • Instruction ID: 7d4aa8072f8991027eb19367de1b94265cfb7171595446c6ca9537d4e3897c01
                                                                                          • Opcode Fuzzy Hash: d33b116caec23ef52018c3b63203c760e4c01ccea5a51dcde48a99424eba862b
                                                                                          • Instruction Fuzzy Hash: 1390022130250802D602715C4418606404DD7D2345F95C016E1468555DC62A8A53A236
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e6308cebcc6b9992b91eb5660421cb02637a2daf5b5db241aac93d7bf8eec07a
                                                                                          • Instruction ID: 404ee5d7bfb28afae1f515282ec67c55da9306a52ae85912293b97c2356f1636
                                                                                          • Opcode Fuzzy Hash: e6308cebcc6b9992b91eb5660421cb02637a2daf5b5db241aac93d7bf8eec07a
                                                                                          • Instruction Fuzzy Hash: 3490022124250C02D640715C8418707404AD7D1601F55C015A0068554DC61B8A6567B5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8b3b2471d02ad810f10b33d3ce0dea29d1d5f9c81f5bceb0606fd2c79225ac03
                                                                                          • Instruction ID: e94fa8547aa8d8f08af2ddd6542439c5f4e2006ff09a683e7ff62dff8785f56d
                                                                                          • Opcode Fuzzy Hash: 8b3b2471d02ad810f10b33d3ce0dea29d1d5f9c81f5bceb0606fd2c79225ac03
                                                                                          • Instruction Fuzzy Hash: F790022120294842D640725C4808B0F814997E2202F95C01DA419A554CC91A89555725
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c0c939a93c28b8e75feb20c56ecad97798810c0564ebd9198a77f6635aa1a648
                                                                                          • Instruction ID: 557956d374679bc0f0bbbf64abfedf452f7dee8df8cd1024f2f95341178e4442
                                                                                          • Opcode Fuzzy Hash: c0c939a93c28b8e75feb20c56ecad97798810c0564ebd9198a77f6635aa1a648
                                                                                          • Instruction Fuzzy Hash: 5A90023160660802D600715C4518706504997D1201F65C415A0468568DC79A8A5166A6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 115e87ef8a22753ddf0204e63fd66d62fd4ac006795c915f651651ebe92909d0
                                                                                          • Instruction ID: 178454be628e69beb4db45428f73ee3f94ab0c5cb45cf3098d55223adf341a87
                                                                                          • Opcode Fuzzy Hash: 115e87ef8a22753ddf0204e63fd66d62fd4ac006795c915f651651ebe92909d0
                                                                                          • Instruction Fuzzy Hash: 7C90022124655502D650715C44086168049B7E1201F55C025A0858594DC55A89556325
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2ef60cc94c2bf41323400bd2fd445598e074cc4fb917c84344ea61e490401721
                                                                                          • Instruction ID: 0ea4412de5017c651c59a66909f20a1b42b865173f0a2a71bb02fc852feeb4a8
                                                                                          • Opcode Fuzzy Hash: 2ef60cc94c2bf41323400bd2fd445598e074cc4fb917c84344ea61e490401721
                                                                                          • Instruction Fuzzy Hash: 02900231203505429A40725C5808A4E814997E2302B95D419A0059554CC91989615325
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5b80c6a1509e88832c5898ca82ffdd8bcf71ae9badf3c83b8403b8dfb47c2d01
                                                                                          • Instruction ID: f769d972d6dbd4f0219a4a09b437c9211457dec019ddee9a7a6027b6b2f50d5f
                                                                                          • Opcode Fuzzy Hash: 5b80c6a1509e88832c5898ca82ffdd8bcf71ae9badf3c83b8403b8dfb47c2d01
                                                                                          • Instruction Fuzzy Hash: 4C90023520250802DA10715C5808646408A97D1301F55D415A0468558DC65989A1A225
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                          • Instruction ID: c26a46f40155d0af60f41735fc008435baf0626200742d2b07df4f600b439870
                                                                                          • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                          • Instruction Fuzzy Hash:
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                          • API String ID: 48624451-2108815105
                                                                                          • Opcode ID: b8905a6b86698fa9d1a5f658e03e25706355d167ec257ff177edf528c8e43843
                                                                                          • Instruction ID: 390d1a32aab457465cdb5ae54ecb711d8e1bf31f59bb65c8478bce4d04e9a6b4
                                                                                          • Opcode Fuzzy Hash: b8905a6b86698fa9d1a5f658e03e25706355d167ec257ff177edf528c8e43843
                                                                                          • Instruction Fuzzy Hash: BA51E6B2A00116BFDF11EF9D898097EFBBCBB492417148229E46DD7641D374DE50C7A0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                          • API String ID: 48624451-2108815105
                                                                                          • Opcode ID: ab05092538fb9f4825adad3969982f3a25b8cbd642c0ab672d95c800443dc9be
                                                                                          • Instruction ID: 555dbddcc55781c2a2806daa82d5c0ac47ce8434ca06aaff7b9179cf276e9c9a
                                                                                          • Opcode Fuzzy Hash: ab05092538fb9f4825adad3969982f3a25b8cbd642c0ab672d95c800443dc9be
                                                                                          • Instruction Fuzzy Hash: 60510875A04645BFCB30DF9DC890A7FBBFCEB84201B04885DE69EC7641D6B4DA408760
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 019B46FC
                                                                                          • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 019B4655
                                                                                          • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 019B4725
                                                                                          • CLIENT(ntdll): Processing section info %ws..., xrefs: 019B4787
                                                                                          • Execute=1, xrefs: 019B4713
                                                                                          • ExecuteOptions, xrefs: 019B46A0
                                                                                          • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 019B4742
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                          • API String ID: 0-484625025
                                                                                          • Opcode ID: 67e4b62eb891f40f15d4b78c02bdd4747570e9d25e0a48832f0fa75a634fd821
                                                                                          • Instruction ID: 678da6a5d91050a58fdad9f718e64edb17abdaa8d98dd56f23585a82f30275d3
                                                                                          • Opcode Fuzzy Hash: 67e4b62eb891f40f15d4b78c02bdd4747570e9d25e0a48832f0fa75a634fd821
                                                                                          • Instruction Fuzzy Hash: D2514A31A0021ABAEF15EBE8DC89FE977ADEF54700F0404A9E60DA7181E771AA41CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: __aulldvrm
                                                                                          • String ID: +$-$0$0
                                                                                          • API String ID: 1302938615-699404926
                                                                                          • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                          • Instruction ID: e28631a731677418fd59a607b61958cdba4464bee8b80712f67dada553acef22
                                                                                          • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                          • Instruction Fuzzy Hash: 8D81E130E1124A8EEF25BE6CC850BFEBFB9AF45321F1C4519D86BA7691C7349840CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: %%%u$[$]:%u
                                                                                          • API String ID: 48624451-2819853543
                                                                                          • Opcode ID: 03001704eb11f1a234e18842bfecde862564183c72e5a0465cedc8c3e1972c84
                                                                                          • Instruction ID: 52c091a87252181e2fd5cb249b20f67aad219eb6599134a9382153af957730a2
                                                                                          • Opcode Fuzzy Hash: 03001704eb11f1a234e18842bfecde862564183c72e5a0465cedc8c3e1972c84
                                                                                          • Instruction Fuzzy Hash: E621337AE10119ABDB11DF69DC40AEE7BEDAF94654F44011AEA19D3240E730DA018BA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 019B02E7
                                                                                          • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 019B02BD
                                                                                          • RTL: Re-Waiting, xrefs: 019B031E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                          • API String ID: 0-2474120054
                                                                                          • Opcode ID: a534f2947b23445643396524a72d672326a21046aadbff796a643177506e5183
                                                                                          • Instruction ID: 05a6c95f6e8dd8a40757bc1b9ef26e12eae00b4e2b7749b96fef3de745f64237
                                                                                          • Opcode Fuzzy Hash: a534f2947b23445643396524a72d672326a21046aadbff796a643177506e5183
                                                                                          • Instruction Fuzzy Hash: 5FE1EF306087429FD725CF2CD994B6ABBE8BF84314F180A5DF5A98B2E1D734D844CB52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RTL: Resource at %p, xrefs: 019B7B8E
                                                                                          • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 019B7B7F
                                                                                          • RTL: Re-Waiting, xrefs: 019B7BAC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                          • API String ID: 0-871070163
                                                                                          • Opcode ID: 4e4f7c1abed498543ad77b65ac1231864bd924e6d6a0c55e498bc19396882b3b
                                                                                          • Instruction ID: 071465c7b84c4a6fcc1977e491ff12eceaed701049369b6f0b8c437e1d3a79a8
                                                                                          • Opcode Fuzzy Hash: 4e4f7c1abed498543ad77b65ac1231864bd924e6d6a0c55e498bc19396882b3b
                                                                                          • Instruction Fuzzy Hash: 6F41E2317047069FD724DE29C940B6AB7E9EF89B11F000A1DF95EDB280DB31E5058B91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 019B728C
                                                                                          Strings
                                                                                          • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 019B7294
                                                                                          • RTL: Resource at %p, xrefs: 019B72A3
                                                                                          • RTL: Re-Waiting, xrefs: 019B72C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                          • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                          • API String ID: 885266447-605551621
                                                                                          • Opcode ID: 963718d7ab027e94b5b04055e9231c242c29ebf9c8e1a1671cfb43f7b468bffc
                                                                                          • Instruction ID: 4f744f56e53120fddc662c30c4f3aca512ea73486686a25442fbe240138f286e
                                                                                          • Opcode Fuzzy Hash: 963718d7ab027e94b5b04055e9231c242c29ebf9c8e1a1671cfb43f7b468bffc
                                                                                          • Instruction Fuzzy Hash: 3541F031700206ABC724DE69CD81FA6B7A5FFD4B11F100A19F95EAB280DB31E842C7D1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: %%%u$]:%u
                                                                                          • API String ID: 48624451-3050659472
                                                                                          • Opcode ID: 4d404c67786e49aee33fa26b00e39d377cac2e3a1155fdf64fbcb122c70d17ff
                                                                                          • Instruction ID: c9a836eacd0326184106c82e0403cc920d64c6adda868c4d80ce856481685932
                                                                                          • Opcode Fuzzy Hash: 4d404c67786e49aee33fa26b00e39d377cac2e3a1155fdf64fbcb122c70d17ff
                                                                                          • Instruction Fuzzy Hash: 16318472A00619AFDB20DF2DCC40BEE77BCEB44611F444559E94DE3200EB70DA448BA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: __aulldvrm
                                                                                          • String ID: +$-
                                                                                          • API String ID: 1302938615-2137968064
                                                                                          • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                          • Instruction ID: 5ad9ca3ae004ad3ae573d18ce675975b2022a84f7fbded479e2dd01e2e1daf13
                                                                                          • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                          • Instruction Fuzzy Hash: 0591B871E002169BDB28FF9DC880ABEBBA9EF44321F74451AE95DE72D1D7309941C721
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $$@
                                                                                          • API String ID: 0-1194432280
                                                                                          • Opcode ID: 2e204dd2e087b20cd4d84903dcf3b510f2fc6fe78030dee9e47cdcbf37551b0b
                                                                                          • Instruction ID: dfe940a2a40959d84a4c1a8ab170deca3ced959d7272f00eb6318fa637db8cfd
                                                                                          • Opcode Fuzzy Hash: 2e204dd2e087b20cd4d84903dcf3b510f2fc6fe78030dee9e47cdcbf37551b0b
                                                                                          • Instruction Fuzzy Hash: 20811975D012699BDB35CB54CC44BEEBBB8BB48754F0041EAAA1DB7280D7709E85CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 019CCFBD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1532555059.0000000001910000.00000040.00001000.00020000.00000000.sdmp, Offset: 01910000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_1910000_DHL Factura Electronica Pendiente documento No 04BB25083.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallFilterFunc@8
                                                                                          • String ID: @$@4Qw@4Qw
                                                                                          • API String ID: 4062629308-2383119779
                                                                                          • Opcode ID: eb5d93269d035e0656ab5b02b3d788e8ee38f7238d78879d09b44ce4eee071a5
                                                                                          • Instruction ID: 24e2d6e37f66f87ebf4430a803979a48598d7c9b41692b867e70d4466ef64dc7
                                                                                          • Opcode Fuzzy Hash: eb5d93269d035e0656ab5b02b3d788e8ee38f7238d78879d09b44ce4eee071a5
                                                                                          • Instruction Fuzzy Hash: CA41AF75900215EFDB21DFA9C840AADBBF8FF94B41F00442EE949EB254E734D901CBA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:2.3%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:4.7%
                                                                                          Total number of Nodes:444
                                                                                          Total number of Limit Nodes:16
                                                                                          execution_graph 13516 e071f82 13517 e071fb8 13516->13517 13519 e072081 13517->13519 13527 e072022 13517->13527 13528 e06e5b2 13517->13528 13520 e072134 13519->13520 13522 e072117 getaddrinfo 13519->13522 13519->13527 13525 e0721b2 13520->13525 13520->13527 13531 e06e732 13520->13531 13522->13520 13524 e0727f4 setsockopt recv 13524->13527 13525->13527 13534 e06e6b2 13525->13534 13526 e072729 13526->13524 13526->13527 13529 e06e5ec 13528->13529 13530 e06e60a socket 13528->13530 13529->13530 13530->13519 13532 e06e76a 13531->13532 13533 e06e788 connect 13531->13533 13532->13533 13533->13525 13535 e06e6e7 13534->13535 13536 e06e705 send 13534->13536 13535->13536 13536->13526 13812 e073a4d 13813 e073a53 13812->13813 13816 e067782 13813->13816 13815 e073a6b 13818 e06778f 13816->13818 13817 e0677ad 13817->13815 13818->13817 13819 e06c662 6 API calls 13818->13819 13819->13817 13915 e06b14a 13916 e06b153 13915->13916 13921 e06b174 13915->13921 13918 e06d382 ObtainUserAgentString 13916->13918 13917 e06b1e7 13919 e06b16c 13918->13919 13920 e0660f2 6 API calls 13919->13920 13920->13921 13921->13917 13923 e0661f2 13921->13923 13924 e0662c9 13923->13924 13925 e06620f 13923->13925 13924->13921 13926 e070f12 7 API calls 13925->13926 13928 e066242 13925->13928 13926->13928 13927 e066289 13927->13924 13929 e0660f2 6 API calls 13927->13929 13928->13927 13930 e067432 NtCreateFile 13928->13930 13929->13924 13930->13927 13765 e072e0a 13766 e071942 13765->13766 13767 e072e45 NtProtectVirtualMemory 13766->13767 13768 e072e70 13767->13768 13840 e06bcd4 13841 e06bcd8 13840->13841 13842 e06c022 13841->13842 13846 e06b352 13841->13846 13844 e06bf0d 13844->13842 13855 e06b792 13844->13855 13848 e06b39e 13846->13848 13847 e06b58e 13847->13844 13848->13847 13849 e06b4ec 13848->13849 13851 e06b595 13848->13851 13850 e071232 NtCreateFile 13849->13850 13853 e06b4ff 13850->13853 13851->13847 13852 e071232 NtCreateFile 13851->13852 13852->13847 13853->13847 13854 e071232 NtCreateFile 13853->13854 13854->13847 13856 e06b7e0 13855->13856 13857 e071232 NtCreateFile 13856->13857 13860 e06b90c 13857->13860 13858 e06baf3 13858->13844 13859 e06b352 NtCreateFile 13859->13860 13860->13858 13860->13859 13861 e06b602 NtCreateFile 13860->13861 13861->13860 13506 e072e12 13507 e072e45 NtProtectVirtualMemory 13506->13507 13510 e071942 13506->13510 13509 e072e70 13507->13509 13511 e071967 13510->13511 13511->13507 13769 e067613 13770 e067620 13769->13770 13771 e072e12 NtProtectVirtualMemory 13770->13771 13772 e067684 13770->13772 13771->13770 13773 e073a1f 13774 e073a25 13773->13774 13777 e0675f2 13774->13777 13776 e073a3d 13778 e06760e 13777->13778 13779 e0675fb 13777->13779 13778->13776 13779->13778 13781 e06c662 13779->13781 13782 e06c66b 13781->13782 13790 e06c7ba 13781->13790 13783 e0660f2 6 API calls 13782->13783 13782->13790 13785 e06c6ee 13783->13785 13784 e06c750 13787 e06c83f 13784->13787 13789 e06c791 13784->13789 13784->13790 13785->13784 13786 e071f82 6 API calls 13785->13786 13786->13784 13788 e071f82 6 API calls 13787->13788 13787->13790 13788->13790 13789->13790 13791 e071f82 6 API calls 13789->13791 13790->13778 13791->13790 13537 e0662dd 13538 e06631a 13537->13538 13539 e0663fa 13538->13539 13540 e066328 SleepEx 13538->13540 13544 e070f12 13538->13544 13553 e067432 13538->13553 13563 e0660f2 13538->13563 13540->13538 13540->13540 13545 e070f48 13544->13545 13546 e071232 NtCreateFile 13545->13546 13547 e0710e9 13545->13547 13551 e071134 13545->13551 13569 e071f82 13545->13569 13546->13545 13549 e071125 13547->13549 13581 e070842 13547->13581 13589 e070922 13549->13589 13551->13538 13554 e06745b 13553->13554 13562 e0674c9 13553->13562 13555 e071232 NtCreateFile 13554->13555 13554->13562 13556 e067496 13555->13556 13557 e0674c5 13556->13557 13601 e067082 13556->13601 13559 e071232 NtCreateFile 13557->13559 13557->13562 13559->13562 13560 e0674b6 13560->13557 13610 e066f52 13560->13610 13562->13538 13564 e0661d3 13563->13564 13565 e066109 13563->13565 13564->13538 13615 e066012 13565->13615 13567 e066113 13567->13564 13568 e071f82 6 API calls 13567->13568 13568->13564 13570 e071fb8 13569->13570 13571 e06e5b2 socket 13570->13571 13572 e072081 13570->13572 13580 e072022 13570->13580 13571->13572 13573 e072134 13572->13573 13575 e072117 getaddrinfo 13572->13575 13572->13580 13574 e06e732 connect 13573->13574 13578 e0721b2 13573->13578 13573->13580 13574->13578 13575->13573 13576 e06e6b2 send 13579 e072729 13576->13579 13577 e0727f4 setsockopt recv 13577->13580 13578->13576 13578->13580 13579->13577 13579->13580 13580->13545 13582 e07086d 13581->13582 13597 e071232 13582->13597 13584 e070906 13584->13547 13585 e070888 13585->13584 13586 e071f82 6 API calls 13585->13586 13587 e0708c5 13585->13587 13586->13587 13587->13584 13588 e071232 NtCreateFile 13587->13588 13588->13584 13590 e0709c2 13589->13590 13591 e071232 NtCreateFile 13590->13591 13594 e0709d6 13591->13594 13592 e070a9f 13592->13551 13593 e070a5d 13593->13592 13595 e071232 NtCreateFile 13593->13595 13594->13592 13594->13593 13596 e071f82 6 API calls 13594->13596 13595->13592 13596->13593 13598 e07125c 13597->13598 13600 e071334 13597->13600 13599 e071410 NtCreateFile 13598->13599 13598->13600 13599->13600 13600->13585 13602 e067420 13601->13602 13603 e0670aa 13601->13603 13602->13560 13603->13602 13604 e071232 NtCreateFile 13603->13604 13606 e0671f9 13604->13606 13605 e0673df 13605->13560 13606->13605 13607 e071232 NtCreateFile 13606->13607 13608 e0673c9 13607->13608 13609 e071232 NtCreateFile 13608->13609 13609->13605 13611 e066f70 13610->13611 13612 e066f84 13610->13612 13611->13557 13613 e071232 NtCreateFile 13612->13613 13614 e067046 13613->13614 13614->13557 13616 e066031 13615->13616 13617 e0660cd 13616->13617 13618 e071f82 6 API calls 13616->13618 13617->13567 13618->13617 13862 e069edd 13864 e069f06 13862->13864 13863 e069fa4 13864->13863 13865 e0668f2 NtProtectVirtualMemory 13864->13865 13866 e069f9c 13865->13866 13867 e06d382 ObtainUserAgentString 13866->13867 13867->13863 13976 e069dd9 13978 e069df0 13976->13978 13977 e069ecd 13978->13977 13979 e06d382 ObtainUserAgentString 13978->13979 13979->13977 13931 e068b66 13932 e068b6a 13931->13932 13933 e068cb5 CreateMutexW 13932->13933 13934 e068cce 13932->13934 13933->13934 13868 e06e2e4 13869 e06e36f 13868->13869 13870 e06e305 13868->13870 13870->13869 13871 e06e0c2 6 API calls 13870->13871 13871->13869 13872 e06bce2 13874 e06bdd9 13872->13874 13873 e06c022 13874->13873 13875 e06b352 NtCreateFile 13874->13875 13876 e06bf0d 13875->13876 13876->13873 13877 e06b792 NtCreateFile 13876->13877 13877->13876 13792 e06742e 13793 e06745b 13792->13793 13801 e0674c9 13792->13801 13794 e071232 NtCreateFile 13793->13794 13793->13801 13795 e067496 13794->13795 13796 e0674c5 13795->13796 13797 e067082 NtCreateFile 13795->13797 13798 e071232 NtCreateFile 13796->13798 13796->13801 13799 e0674b6 13797->13799 13798->13801 13799->13796 13800 e066f52 NtCreateFile 13799->13800 13800->13796 13912 e06e72e 13913 e06e76a 13912->13913 13914 e06e788 connect 13912->13914 13913->13914 13619 e072bac 13620 e072bb1 13619->13620 13653 e072bb6 13620->13653 13654 e068b72 13620->13654 13622 e072c2c 13623 e072c85 13622->13623 13624 e072c54 13622->13624 13625 e072c69 13622->13625 13622->13653 13626 e070ab2 NtProtectVirtualMemory 13623->13626 13627 e070ab2 NtProtectVirtualMemory 13624->13627 13628 e072c80 13625->13628 13629 e072c6e 13625->13629 13630 e072c8d 13626->13630 13632 e072c5c 13627->13632 13628->13623 13634 e072c97 13628->13634 13633 e070ab2 NtProtectVirtualMemory 13629->13633 13690 e06a102 13630->13690 13676 e069ee2 13632->13676 13638 e072c76 13633->13638 13635 e072cbe 13634->13635 13636 e072c9c 13634->13636 13640 e072cc7 13635->13640 13641 e072cd9 13635->13641 13635->13653 13658 e070ab2 13636->13658 13682 e069fc2 13638->13682 13643 e070ab2 NtProtectVirtualMemory 13640->13643 13645 e070ab2 NtProtectVirtualMemory 13641->13645 13641->13653 13644 e072ccf 13643->13644 13700 e06a2f2 13644->13700 13648 e072ce5 13645->13648 13718 e06a712 13648->13718 13656 e068b93 13654->13656 13655 e068cce 13655->13622 13656->13655 13657 e068cb5 CreateMutexW 13656->13657 13657->13655 13660 e070adf 13658->13660 13659 e070ebc 13668 e069de2 13659->13668 13660->13659 13730 e0668f2 13660->13730 13662 e070e5c 13663 e0668f2 NtProtectVirtualMemory 13662->13663 13664 e070e7c 13663->13664 13665 e0668f2 NtProtectVirtualMemory 13664->13665 13666 e070e9c 13665->13666 13667 e0668f2 NtProtectVirtualMemory 13666->13667 13667->13659 13669 e069df0 13668->13669 13671 e069ecd 13669->13671 13753 e06d382 13669->13753 13672 e066412 13671->13672 13674 e066440 13672->13674 13673 e066473 13673->13653 13674->13673 13675 e06644d CreateThread 13674->13675 13675->13653 13677 e069f06 13676->13677 13678 e069fa4 13677->13678 13679 e0668f2 NtProtectVirtualMemory 13677->13679 13678->13653 13680 e069f9c 13679->13680 13681 e06d382 ObtainUserAgentString 13680->13681 13681->13678 13685 e06a016 13682->13685 13683 e06a0f0 13683->13653 13684 e06a0e8 13686 e06d382 ObtainUserAgentString 13684->13686 13685->13683 13687 e0668f2 NtProtectVirtualMemory 13685->13687 13688 e06a0bb 13685->13688 13686->13683 13687->13688 13688->13684 13689 e0668f2 NtProtectVirtualMemory 13688->13689 13689->13684 13692 e06a137 13690->13692 13691 e06a2d5 13691->13653 13692->13691 13693 e0668f2 NtProtectVirtualMemory 13692->13693 13694 e06a28a 13693->13694 13695 e0668f2 NtProtectVirtualMemory 13694->13695 13697 e06a2a9 13695->13697 13696 e06a2cd 13698 e06d382 ObtainUserAgentString 13696->13698 13697->13696 13699 e0668f2 NtProtectVirtualMemory 13697->13699 13698->13691 13699->13696 13703 e06a349 13700->13703 13701 e06a49f 13702 e0668f2 NtProtectVirtualMemory 13701->13702 13706 e06a4c3 13701->13706 13702->13706 13703->13701 13704 e0668f2 NtProtectVirtualMemory 13703->13704 13705 e06a480 13704->13705 13707 e0668f2 NtProtectVirtualMemory 13705->13707 13708 e0668f2 NtProtectVirtualMemory 13706->13708 13709 e06a597 13706->13709 13707->13701 13708->13709 13710 e0668f2 NtProtectVirtualMemory 13709->13710 13711 e06a5bf 13709->13711 13710->13711 13714 e0668f2 NtProtectVirtualMemory 13711->13714 13715 e06a6b9 13711->13715 13712 e06a6e1 13713 e06d382 ObtainUserAgentString 13712->13713 13716 e06a6e9 13713->13716 13714->13715 13715->13712 13717 e0668f2 NtProtectVirtualMemory 13715->13717 13716->13653 13717->13712 13719 e06a767 13718->13719 13720 e0668f2 NtProtectVirtualMemory 13719->13720 13725 e06a903 13719->13725 13721 e06a8e3 13720->13721 13722 e0668f2 NtProtectVirtualMemory 13721->13722 13722->13725 13723 e06a9b7 13724 e06d382 ObtainUserAgentString 13723->13724 13726 e06a9bf 13724->13726 13727 e0668f2 NtProtectVirtualMemory 13725->13727 13728 e06a992 13725->13728 13726->13653 13727->13728 13728->13723 13729 e0668f2 NtProtectVirtualMemory 13728->13729 13729->13723 13731 e066987 13730->13731 13734 e0669b2 13731->13734 13745 e067622 13731->13745 13733 e066c0c 13733->13662 13734->13733 13735 e066ba2 13734->13735 13737 e066ac5 13734->13737 13736 e072e12 NtProtectVirtualMemory 13735->13736 13744 e066b5b 13736->13744 13749 e072e12 13737->13749 13739 e072e12 NtProtectVirtualMemory 13739->13733 13740 e066ae3 13740->13733 13741 e066b3d 13740->13741 13742 e072e12 NtProtectVirtualMemory 13740->13742 13743 e072e12 NtProtectVirtualMemory 13741->13743 13742->13741 13743->13744 13744->13733 13744->13739 13746 e06767a 13745->13746 13747 e072e12 NtProtectVirtualMemory 13746->13747 13748 e067684 13746->13748 13747->13746 13748->13734 13750 e072e45 NtProtectVirtualMemory 13749->13750 13751 e071942 13749->13751 13752 e072e70 13750->13752 13751->13750 13752->13740 13754 e06d3c7 13753->13754 13757 e06d232 13754->13757 13756 e06d438 13756->13671 13758 e06d25e 13757->13758 13761 e06c8c2 13758->13761 13760 e06d26b 13760->13756 13762 e06c934 13761->13762 13763 e06c995 ObtainUserAgentString 13762->13763 13764 e06c9a6 13762->13764 13763->13764 13764->13760 13802 e06d22a 13803 e06d25e 13802->13803 13804 e06c8c2 ObtainUserAgentString 13803->13804 13805 e06d26b 13804->13805 13820 e073aa9 13821 e073aaf 13820->13821 13824 e06e212 13821->13824 13823 e073ac7 13825 e06e237 13824->13825 13826 e06e21b 13824->13826 13825->13823 13826->13825 13828 e06e0c2 13826->13828 13829 e06e1f0 13828->13829 13830 e06e0cb 13828->13830 13829->13825 13830->13829 13831 e071f82 6 API calls 13830->13831 13831->13829 13878 e06a2f4 13879 e06a349 13878->13879 13880 e06a49f 13879->13880 13882 e0668f2 NtProtectVirtualMemory 13879->13882 13881 e0668f2 NtProtectVirtualMemory 13880->13881 13885 e06a4c3 13880->13885 13881->13885 13883 e06a480 13882->13883 13884 e0668f2 NtProtectVirtualMemory 13883->13884 13884->13880 13886 e0668f2 NtProtectVirtualMemory 13885->13886 13887 e06a597 13885->13887 13886->13887 13888 e0668f2 NtProtectVirtualMemory 13887->13888 13889 e06a5bf 13887->13889 13888->13889 13892 e0668f2 NtProtectVirtualMemory 13889->13892 13893 e06a6b9 13889->13893 13890 e06a6e1 13891 e06d382 ObtainUserAgentString 13890->13891 13894 e06a6e9 13891->13894 13892->13893 13893->13890 13895 e0668f2 NtProtectVirtualMemory 13893->13895 13895->13890 13951 e0739b3 13952 e0739bd 13951->13952 13955 e0686d2 13952->13955 13954 e0739e0 13956 e0686f7 13955->13956 13957 e068704 13955->13957 13958 e0660f2 6 API calls 13956->13958 13959 e06872d 13957->13959 13961 e0686ff 13957->13961 13962 e068737 13957->13962 13958->13961 13964 e06e2c2 13959->13964 13961->13954 13962->13961 13963 e071f82 6 API calls 13962->13963 13963->13961 13965 e06e2df 13964->13965 13966 e06e2cb 13964->13966 13965->13961 13966->13965 13967 e06e0c2 6 API calls 13966->13967 13967->13965 13512 e071232 13513 e07125c 13512->13513 13515 e071334 13512->13515 13514 e071410 NtCreateFile 13513->13514 13513->13515 13514->13515 13980 e0739f1 13981 e0739f7 13980->13981 13984 e068852 13981->13984 13983 e073a0f 13985 e0688e4 13984->13985 13986 e068865 13984->13986 13985->13983 13986->13985 13988 e068887 13986->13988 13990 e06887e 13986->13990 13987 e06e36f 13987->13983 13988->13985 13989 e06c662 6 API calls 13988->13989 13989->13985 13990->13987 13991 e06e0c2 6 API calls 13990->13991 13991->13987 13896 e0660f1 13897 e066109 13896->13897 13901 e0661d3 13896->13901 13898 e066012 6 API calls 13897->13898 13899 e066113 13898->13899 13900 e071f82 6 API calls 13899->13900 13899->13901 13900->13901 13992 e0675f1 13993 e067606 13992->13993 13994 e06760e 13992->13994 13995 e06c662 6 API calls 13993->13995 13995->13994 13832 e06c8be 13833 e06c8c3 13832->13833 13834 e06c9a6 13833->13834 13835 e06c995 ObtainUserAgentString 13833->13835 13835->13834 13968 e069fbf 13969 e06a016 13968->13969 13972 e0668f2 NtProtectVirtualMemory 13969->13972 13973 e06a0bb 13969->13973 13974 e06a0f0 13969->13974 13970 e06a0e8 13971 e06d382 ObtainUserAgentString 13970->13971 13971->13974 13972->13973 13973->13970 13975 e0668f2 NtProtectVirtualMemory 13973->13975 13975->13970 13806 e07083a 13807 e070841 13806->13807 13808 e071f82 6 API calls 13807->13808 13810 e0708c5 13808->13810 13809 e070906 13810->13809 13811 e071232 NtCreateFile 13810->13811 13811->13809 13902 e06a0fb 13904 e06a137 13902->13904 13903 e06a2d5 13904->13903 13905 e0668f2 NtProtectVirtualMemory 13904->13905 13906 e06a28a 13905->13906 13907 e0668f2 NtProtectVirtualMemory 13906->13907 13910 e06a2a9 13907->13910 13908 e06a2cd 13909 e06d382 ObtainUserAgentString 13908->13909 13909->13903 13910->13908 13911 e0668f2 NtProtectVirtualMemory 13910->13911 13911->13908 13939 e071f7a 13940 e071fb8 13939->13940 13941 e06e5b2 socket 13940->13941 13942 e072081 13940->13942 13950 e072022 13940->13950 13941->13942 13943 e072134 13942->13943 13945 e072117 getaddrinfo 13942->13945 13942->13950 13944 e06e732 connect 13943->13944 13946 e0721b2 13943->13946 13943->13950 13944->13946 13945->13943 13947 e06e6b2 send 13946->13947 13946->13950 13949 e072729 13947->13949 13948 e0727f4 setsockopt recv 13948->13950 13949->13948 13949->13950 13836 e06e0b9 13837 e06e0ed 13836->13837 13839 e06e1f0 13836->13839 13838 e071f82 6 API calls 13837->13838 13837->13839 13838->13839

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 e071f82-e071fb6 1 e071fd6-e071fd9 0->1 2 e071fb8-e071fbc 0->2 4 e071fdf-e071fed 1->4 5 e0728fe-e07290c 1->5 2->1 3 e071fbe-e071fc2 2->3 3->1 6 e071fc4-e071fc8 3->6 7 e0728f6-e0728f7 4->7 8 e071ff3-e071ff7 4->8 6->1 9 e071fca-e071fce 6->9 7->5 10 e071fff-e072000 8->10 11 e071ff9-e071ffd 8->11 9->1 12 e071fd0-e071fd4 9->12 13 e07200a-e072010 10->13 11->10 11->13 12->1 12->4 14 e072012-e072020 13->14 15 e07203a-e072060 13->15 14->15 18 e072022-e072026 14->18 16 e072062-e072066 15->16 17 e072068-e07207c call e06e5b2 15->17 16->17 19 e0720a8-e0720ab 16->19 22 e072081-e0720a2 17->22 18->7 21 e07202c-e072035 18->21 23 e072144-e072150 19->23 24 e0720b1-e0720b8 19->24 21->7 22->19 26 e0728ee-e0728ef 22->26 25 e072156-e072165 23->25 23->26 27 e0720e2-e0720f5 24->27 28 e0720ba-e0720dc call e071942 24->28 31 e072167-e072178 call e06e552 25->31 32 e07217f-e07218f 25->32 26->7 27->26 30 e0720fb-e072101 27->30 28->27 30->26 34 e072107-e072109 30->34 31->32 36 e0721e5-e07221b 32->36 37 e072191-e0721ad call e06e732 32->37 34->26 40 e07210f-e072111 34->40 38 e07222d-e072231 36->38 39 e07221d-e07222b 36->39 43 e0721b2-e0721da 37->43 45 e072247-e07224b 38->45 46 e072233-e072245 38->46 44 e07227f-e072280 39->44 40->26 47 e072117-e072132 getaddrinfo 40->47 43->36 48 e0721dc-e0721e1 43->48 52 e072283-e0722e0 call e072d62 call e06f482 call e06ee72 call e073002 44->52 49 e072261-e072265 45->49 50 e07224d-e07225f 45->50 46->44 47->23 51 e072134-e07213c 47->51 48->36 53 e072267-e07226b 49->53 54 e07226d-e072279 49->54 50->44 51->23 63 e0722f4-e072354 call e072d92 52->63 64 e0722e2-e0722e6 52->64 53->52 53->54 54->44 69 e07248c-e0724b8 call e072d62 call e073262 63->69 70 e07235a-e072396 call e072d62 call e073262 call e073002 63->70 64->63 65 e0722e8-e0722ef call e06f042 64->65 65->63 80 e0724ba-e0724d5 69->80 81 e0724d9-e072590 call e073262 * 3 call e073002 * 2 call e06f482 69->81 85 e0723bb-e0723e9 call e073262 * 2 70->85 86 e072398-e0723b7 call e073262 call e073002 70->86 80->81 109 e072595-e0725b9 call e073262 81->109 101 e072415-e07241d 85->101 102 e0723eb-e072410 call e073002 call e073262 85->102 86->85 103 e072442-e072448 101->103 104 e07241f-e072425 101->104 102->101 103->109 110 e07244e-e072456 103->110 107 e072467-e072487 call e073262 104->107 108 e072427-e07243d 104->108 107->109 108->109 120 e0725d1-e0726ad call e073262 * 7 call e073002 call e072d62 call e073002 call e06ee72 call e06f042 109->120 121 e0725bb-e0725cc call e073262 call e073002 109->121 110->109 114 e07245c-e07245d 110->114 114->107 132 e0726af-e0726b3 120->132 121->132 134 e0726b5-e0726fa call e06e382 call e06e7b2 132->134 135 e0726ff-e07272d call e06e6b2 132->135 155 e0728e6-e0728e7 134->155 145 e07272f-e072735 135->145 146 e07275d-e072761 135->146 145->146 149 e072737-e07274c 145->149 150 e072767-e07276b 146->150 151 e07290d-e072913 146->151 149->146 156 e07274e-e072754 149->156 152 e072771-e072773 150->152 153 e0728aa-e0728df call e06e7b2 150->153 157 e072779-e072784 151->157 158 e072919-e072920 151->158 152->153 152->157 153->155 155->26 156->146 163 e072756 156->163 159 e072786-e072793 157->159 160 e072795-e072796 157->160 158->159 159->160 164 e07279c-e0727a0 159->164 160->164 163->146 167 e0727a2-e0727af 164->167 168 e0727b1-e0727b2 164->168 167->168 170 e0727b8-e0727c4 167->170 168->170 173 e0727c6-e0727ef call e072d92 call e072d62 170->173 174 e0727f4-e072861 setsockopt recv 170->174 173->174 177 e0728a3-e0728a4 174->177 178 e072863 174->178 177->153 178->177 181 e072865-e07286a 178->181 181->177 184 e07286c-e072872 181->184 184->177 185 e072874-e0728a1 184->185 185->177 185->178
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: getaddrinforecvsetsockopt
                                                                                          • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                                                                          • API String ID: 1564272048-1117930895
                                                                                          • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                          • Instruction ID: b677830b0bf3d02e25731e0d53eff36aea4563ca0b8ebdf09f918a6122e4ce01
                                                                                          • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                          • Instruction Fuzzy Hash: FF528070A18B088BDB69EF68C4947E9B7E1FB54300F504A2EC4DFC7156EE34A946CB85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 303 e071232-e071256 304 e0718bd-e0718cd 303->304 305 e07125c-e071260 303->305 305->304 306 e071266-e0712a0 305->306 307 e0712a2-e0712a6 306->307 308 e0712bf 306->308 307->308 309 e0712a8-e0712ac 307->309 310 e0712c6 308->310 311 e0712b4-e0712b8 309->311 312 e0712ae-e0712b2 309->312 313 e0712cb-e0712cf 310->313 311->313 314 e0712ba-e0712bd 311->314 312->310 315 e0712d1-e0712f7 call e071942 313->315 316 e0712f9-e07130b 313->316 314->313 315->316 320 e071378 315->320 316->320 321 e07130d-e071332 316->321 324 e07137a-e0713a0 320->324 322 e071334-e07133b 321->322 323 e0713a1-e0713a8 321->323 327 e071366-e071370 322->327 328 e07133d-e071360 call e071942 322->328 325 e0713d5-e0713dc 323->325 326 e0713aa-e0713d3 call e071942 323->326 330 e071410-e071458 NtCreateFile call e071172 325->330 331 e0713de-e07140a call e071942 325->331 326->320 326->325 327->320 333 e071372-e071373 327->333 328->327 339 e07145d-e07145f 330->339 331->320 331->330 333->320 339->320 340 e071465-e07146d 339->340 340->320 341 e071473-e071476 340->341 342 e071486-e07148d 341->342 343 e071478-e071481 341->343 344 e0714c2-e0714ec 342->344 345 e07148f-e0714b8 call e071942 342->345 343->324 351 e0714f2-e0714f5 344->351 352 e0718ae-e0718b8 344->352 345->320 350 e0714be-e0714bf 345->350 350->344 353 e071604-e071611 351->353 354 e0714fb-e0714fe 351->354 352->320 353->324 355 e071500-e071507 354->355 356 e07155e-e071561 354->356 359 e071509-e071532 call e071942 355->359 360 e071538-e071559 355->360 361 e071567-e071572 356->361 362 e071616-e071619 356->362 359->320 359->360 368 e0715e9-e0715fa 360->368 363 e071574-e07159d call e071942 361->363 364 e0715a3-e0715a6 361->364 366 e07161f-e071626 362->366 367 e0716b8-e0716bb 362->367 363->320 363->364 364->320 370 e0715ac-e0715b6 364->370 374 e071657-e07166b call e072e92 366->374 375 e071628-e071651 call e071942 366->375 371 e0716bd-e0716c4 367->371 372 e071739-e07173c 367->372 368->353 370->320 380 e0715bc-e0715e6 370->380 381 e0716c6-e0716ef call e071942 371->381 382 e0716f5-e071734 371->382 376 e0717c4-e0717c7 372->376 377 e071742-e071749 372->377 374->320 391 e071671-e0716b3 374->391 375->320 375->374 376->320 387 e0717cd-e0717d4 376->387 384 e07174b-e071774 call e071942 377->384 385 e07177a-e0717bf 377->385 380->368 381->352 381->382 396 e071894-e0718a9 382->396 384->352 384->385 385->396 392 e0717d6-e0717f6 call e071942 387->392 393 e0717fc-e071803 387->393 391->324 392->393 400 e071805-e071825 call e071942 393->400 401 e07182b-e071835 393->401 396->324 400->401 401->352 402 e071837-e07183e 401->402 402->352 407 e071840-e071886 402->407 407->396
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID: `
                                                                                          • API String ID: 823142352-2679148245
                                                                                          • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                          • Instruction ID: 83c073d979422494792db4156a0bdc6e6b80a02f7b2de48ec312f46c763c9851
                                                                                          • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                          • Instruction Fuzzy Hash: F2224C70A19A099FCB99DF28C4957AEF7E1FB58301F40462ED49ED3690DB30E852CB85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 447 e072e12-e072e38 448 e072e45-e072e6e NtProtectVirtualMemory 447->448 449 e072e40 call e071942 447->449 450 e072e70-e072e7c 448->450 451 e072e7d-e072e8f 448->451 449->448
                                                                                          APIs
                                                                                          • NtProtectVirtualMemory.NTDLL ref: 0E072E67
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProtectVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2706961497-0
                                                                                          • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                          • Instruction ID: deef04795357d640a2c115fe3cdcec01c7a35d2d0427a5741956b93b20602c3b
                                                                                          • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                          • Instruction Fuzzy Hash: 3801B530628B484F8784EF6CD480166B7E4FBCD314F000B3EE99AC3254D770C9414742
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 452 e072e0a-e072e6e call e071942 NtProtectVirtualMemory 455 e072e70-e072e7c 452->455 456 e072e7d-e072e8f 452->456
                                                                                          APIs
                                                                                          • NtProtectVirtualMemory.NTDLL ref: 0E072E67
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProtectVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2706961497-0
                                                                                          • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                          • Instruction ID: fcfd116f92468b0b14f1373b72dcfea525686fcd629f68cf3437aa4ada0aab2c
                                                                                          • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                          • Instruction Fuzzy Hash: BF01A234628B884B8B48EB2C94412A6B3E5FBCE314F000B3EE9DAC3250DB21D9024786
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • ObtainUserAgentString.URLMON ref: 0E06C9A0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: AgentObtainStringUser
                                                                                          • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                          • API String ID: 2681117516-319646191
                                                                                          • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                          • Instruction ID: 36c32afd9367f6c4f238b16dbd716e1b7bcb3f59efae17a9401f21733188aaf4
                                                                                          • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                          • Instruction Fuzzy Hash: 8F31E571A14A0C8FDB44EFA8D8947EEBBE0FF58204F40062AD48ED7250DF788A45C799
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • ObtainUserAgentString.URLMON ref: 0E06C9A0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: AgentObtainStringUser
                                                                                          • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                          • API String ID: 2681117516-319646191
                                                                                          • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                          • Instruction ID: 2ca625d83dada57f63f0a33367f5519572d2ad9cab5c2927b04e08a4f60a1648
                                                                                          • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                          • Instruction Fuzzy Hash: 5B21E670A10A4C8BDB44EFA8C8947EEBBF4FF58204F40461AD49AD7250DF788A05C799
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 232 e068b66-e068b68 233 e068b93-e068bb8 232->233 234 e068b6a-e068b6b 232->234 237 e068bbb-e068bbc 233->237 235 e068bbe-e068c22 call e06f612 call e071942 * 2 234->235 236 e068b6d-e068b71 234->236 246 e068cdc 235->246 247 e068c28-e068c2b 235->247 236->237 238 e068b73-e068b92 236->238 237->235 238->233 249 e068cde-e068cf6 246->249 247->246 248 e068c31-e068cd3 call e073da4 call e073022 call e0733e2 call e073022 call e0733e2 CreateMutexW 247->248 248->246 263 e068cd5-e068cda 248->263 263->249
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID: .dll$el32$kern
                                                                                          • API String ID: 1964310414-1222553051
                                                                                          • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                          • Instruction ID: b8b88101dc3632d10623bb62e4c9cd3a930aea05a81f257c8f36068c7aa5e943
                                                                                          • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                          • Instruction Fuzzy Hash: 88413C70918A0C8FDB98EFA8C8987ED77E0FF58300F04467AD84ADB255DE349945CB95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID: .dll$el32$kern
                                                                                          • API String ID: 1964310414-1222553051
                                                                                          • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                          • Instruction ID: 1e17ac6bc36969793103ad0889c9cd92c0163cc08d64352f03a2c653c86cf6a3
                                                                                          • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                          • Instruction Fuzzy Hash: F2413970918A088FDB94EFA8C498BED77E0FF58300F04457AC84ADB255DE349945CB85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 293 e06e72e-e06e768 294 e06e76a-e06e782 call e071942 293->294 295 e06e788-e06e7ab connect 293->295 294->295
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: connect
                                                                                          • String ID: conn$ect
                                                                                          • API String ID: 1959786783-716201944
                                                                                          • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                          • Instruction ID: fae0da60d0b487d07fb61eb65583468d4b33bf4bf5bb6313698951318a8b1fd3
                                                                                          • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                          • Instruction Fuzzy Hash: 58015E30618B188FCB84EF1CE088B55B7E0FB58314F1545AED90DCB266C674CD818BC2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 298 e06e732-e06e768 299 e06e76a-e06e782 call e071942 298->299 300 e06e788-e06e7ab connect 298->300 299->300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: connect
                                                                                          • String ID: conn$ect
                                                                                          • API String ID: 1959786783-716201944
                                                                                          • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                          • Instruction ID: 6e2467796204983e0b2900ab987f46068faadb2e689544648b2d101a3972c507
                                                                                          • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                          • Instruction Fuzzy Hash: 94012C70618A1C8FCB84EF5CE088B55B7E0FB59314F1545AEA80DCB266CA74CD828BC2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 411 e06e6b2-e06e6e5 412 e06e6e7-e06e6ff call e071942 411->412 413 e06e705-e06e72d send 411->413 412->413
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: send
                                                                                          • String ID: send
                                                                                          • API String ID: 2809346765-2809346765
                                                                                          • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                          • Instruction ID: a64f04bcdcc289f9c54e2e1511d232b9ae2b55877657c3f598c872b1fb6907c5
                                                                                          • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                          • Instruction Fuzzy Hash: 2B011270518A188FDBC4EF1CE048B6577E0EB58314F1545AED85DCB266C670DC818B85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 416 e06e5b2-e06e5ea 417 e06e5ec-e06e604 call e071942 416->417 418 e06e60a-e06e62b socket 416->418 417->418
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: socket
                                                                                          • String ID: sock
                                                                                          • API String ID: 98920635-2415254727
                                                                                          • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                          • Instruction ID: 5819230b75c6984e6bd38430e53173de53bb0740056a96a69b77e74809895bcf
                                                                                          • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                          • Instruction Fuzzy Hash: 7A0121706186188FCB84EF1CE048B55BBE0FB59354F1545ADE85ECB266C7B0C9828B86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 421 e0662dd-e066320 call e071942 424 e066326 421->424 425 e0663fa-e06640e 421->425 426 e066328-e066339 SleepEx 424->426 426->426 427 e06633b-e066341 426->427 428 e066343-e066349 427->428 429 e06634b-e066352 427->429 428->429 430 e06635c-e06636a call e070f12 428->430 431 e066354-e06635a 429->431 432 e066370-e066376 429->432 430->432 431->430 431->432 434 e0663b7-e0663bd 432->434 435 e066378-e06637e 432->435 438 e0663d4-e0663db 434->438 439 e0663bf-e0663cf call e066e72 434->439 435->434 437 e066380-e06638a 435->437 437->434 441 e06638c-e0663b1 call e067432 437->441 438->426 440 e0663e1-e0663f5 call e0660f2 438->440 439->438 440->426 441->434
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 3472027048-0
                                                                                          • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                          • Instruction ID: 16fdae74e88b5a02fde8dc5deb7d1a9b909e388f00c6da2962c3cef27d31466f
                                                                                          • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                          • Instruction Fuzzy Hash: C73178B0A14B19DBDBA4AF2990983E9B7E0FB54300F44467EC92D8B116CB32A954CFD1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 457 e066412-e066446 call e071942 460 e066473-e06647d 457->460 461 e066448-e066472 call e073c9e CreateThread 457->461
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899090558.000000000E050000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E050000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_e050000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2422867632-0
                                                                                          • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                          • Instruction ID: 447430f08e7dd70e57b63aa6dce0e6cefe0e7a69ebea64873a57bfa091926139
                                                                                          • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                          • Instruction Fuzzy Hash: B0F0F630668A484FD788EF2CD44567AF3E0FBE8214F450A3EE98DC3264DA39C9824716
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                                                                          • API String ID: 0-393284711
                                                                                          • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                          • Instruction ID: c789b1d486cc3ba5eeda4fb8e567390577dd9982f139171bb6290f156063d251
                                                                                          • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                          • Instruction Fuzzy Hash: 12E149B4518B4C8FCB64EF68C4847AAB7E0FB58301F514A2E969BC7245DF30E541DB89
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                                                                          • API String ID: 0-2916316912
                                                                                          • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                          • Instruction ID: 4cad20a5ed7da2720909e1c03811e2efc7b3c18d09ba0353bbdb6e841878d541
                                                                                          • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                          • Instruction Fuzzy Hash: 01B18870518B488EDB19EF68C485AEEB7F1FF98340F40891ED59AC7251EF70D9058B86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                                                                          • API String ID: 0-1539916866
                                                                                          • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                          • Instruction ID: f39d079ff3255ecbd619fdbeb77a6c64c8567e3e23f1ceffe1ccdff76efab9ab
                                                                                          • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                          • Instruction Fuzzy Hash: 1141BDB0A18B0C8FDB24DF88A4456BE7BE2FB88741F00025ED809D3246DBB5DD458BD6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                                                                          • API String ID: 0-355182820
                                                                                          • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                          • Instruction ID: c8b6230c2be0788509b9f4c5b7bcb428101b183a2b09a24b8094c06d8cfd3e17
                                                                                          • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                          • Instruction Fuzzy Hash: A4C15BB0618B098FC758EF64C885AAAF3E5FB94304F41472ED69AC7250DF30E615CB86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                                                                          • API String ID: 0-97273177
                                                                                          • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                          • Instruction ID: 78fedaec4c20fabaa01b4aa3bc44349df4da39a02a02a5e1cb91c21356bedb1f
                                                                                          • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                          • Instruction Fuzzy Hash: 8F51BF7151C7488FD719DF18D8812AAB7E5FFC5740F501A2EE98BC7242DBB4D9068B82
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                          • API String ID: 0-639201278
                                                                                          • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                          • Instruction ID: 2bb73841cecd149ccdc480d48645a008317c2293ebe113a9961e91d30516325e
                                                                                          • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                          • Instruction Fuzzy Hash: BFC18FB1618A1D4FC758EB68D895AAAF3E5FF98340F554329850FC7250DF30EA029BC6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                          • API String ID: 0-639201278
                                                                                          • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                          • Instruction ID: 8bbd67e132038e00e9da59838b72de0da176504df86c900a3b5daab7eb8a8dd2
                                                                                          • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                          • Instruction Fuzzy Hash: 81C19EB0618A1D4FC758EF68D895AAAF3E5FF98340F554329850EC7250DF30EA029BC6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: UR$2$L: $Pass$User$name$word
                                                                                          • API String ID: 0-2058692283
                                                                                          • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                          • Instruction ID: 99062a1573abcf4d03305b61aac39d53da6c548eb2de5a99c3a07dedbafe335f
                                                                                          • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                          • Instruction Fuzzy Hash: E3A1BF70618B4C8FDB29EFA894447EEB7E1FF98340F00462DE58AD7242EA7095458789
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: UR$2$L: $Pass$User$name$word
                                                                                          • API String ID: 0-2058692283
                                                                                          • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                          • Instruction ID: 0f686eaefa4b526c84b120b657bf1d2fdacffca6875641e23fa337b2bbf25196
                                                                                          • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                          • Instruction Fuzzy Hash: 99919F70618B4C8FDB29EFA8D4447EEB7E1FF98340F00462DE48AD7242EB7495458B89
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $.$e$n$v
                                                                                          • API String ID: 0-1849617553
                                                                                          • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                          • Instruction ID: e452c06903ad28994d83a4fa75f0ab2ec3337b86a0969236dd4bf44a763a5fbe
                                                                                          • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                          • Instruction Fuzzy Hash: EC719D71618B4C8FD758EFA8C4887AAB7F4FF98344F00062EE54AC7221EB70D9458B85
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2.dl$dll$l32.$ole3$shel
                                                                                          • API String ID: 0-1970020201
                                                                                          • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                          • Instruction ID: 889ce7dab0b438fc8327e12d6b2cbe8395467cc514c2e8b459030bfe248b9547
                                                                                          • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                          • Instruction Fuzzy Hash: 32513CB0918B4C8FDB54EFA4C045AEEB7F1FF58300F41462E959AE7214EF7096419B89
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4$\$dll$ion.$vers
                                                                                          • API String ID: 0-1610437797
                                                                                          • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                          • Instruction ID: 2c1569b22f3351ff28ce9c4901a1714e8dfabceaee2ca2388451c935c813b7ca
                                                                                          • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                          • Instruction Fuzzy Hash: 5A41A470618B8D8FDBB5EF6498457EA77E4FB98301F51462E998ECB240EF30D5058782
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 32.d$cli.$dll$sspi$user
                                                                                          • API String ID: 0-327345718
                                                                                          • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                          • Instruction ID: b58695d59f56c82e27aeeb66a2aa4fe48fa5c00c5f74c70c600d21d670c034d1
                                                                                          • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                          • Instruction Fuzzy Hash: B84192B0A59F0D8FCB58EF58C0953AD73E5FB68340F50456AA80ED3200DAB4D641DBC6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .dll$el32$h$kern
                                                                                          • API String ID: 0-4264704552
                                                                                          • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                          • Instruction ID: 9e5b553876024a3226fa70ee31367ec95510612a9e6f1c081b907ac858a75059
                                                                                          • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                          • Instruction Fuzzy Hash: 28418070608B4C8FD7A9DF6884843BAB7E5FB98340F144A2EA69EC7255EB70C545CB42
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $Snif$f fr$om:
                                                                                          • API String ID: 0-3434893486
                                                                                          • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                          • Instruction ID: 2a84605573ba66bc8a6990327cce3d348b24f9b28dd602d0ef41d39545769d58
                                                                                          • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                          • Instruction Fuzzy Hash: C531E1B151CB8C5FC71AEB28C0846EAB7D4FB84340F50491EE59BC7252EE31E649CB42
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $Snif$f fr$om:
                                                                                          • API String ID: 0-3434893486
                                                                                          • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                          • Instruction ID: 25772d1e2c530af83fa3fad3824bb89c265c0c3f46e7ed2f60be5d76466e6f38
                                                                                          • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                          • Instruction Fuzzy Hash: DD31E1B151CB4C6FD71AEB28C4856EAB7D4FB94340F40491EE59BC3252EE31E606CB42
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .dll$chro$hild$me_c
                                                                                          • API String ID: 0-3136806129
                                                                                          • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                          • Instruction ID: 7fc2d7ab77007b6c425cc7650db699e0c8162dc8c83f9b16a84de3664e1d85fe
                                                                                          • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                          • Instruction Fuzzy Hash: 6B319CB011CB4C4FCB85EF688495BAAB7E1FF98240F85062DA54ECB214DF30C605DB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .dll$chro$hild$me_c
                                                                                          • API String ID: 0-3136806129
                                                                                          • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                          • Instruction ID: 76af5201d9164ee84036b708344bac229ad9c401d8ac7c304b2cd45647898a1d
                                                                                          • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                          • Instruction Fuzzy Hash: 3B318BB021CB4C8FCB85EF688494BAAB7E1FF98340F95062D954ACB254DF30C605DB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                          • API String ID: 0-319646191
                                                                                          • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                          • Instruction ID: edc23368b647a30ebb1f1aee49c942014f158373882b1e8a26bf435a40b8141d
                                                                                          • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                          • Instruction Fuzzy Hash: 5B31CE71614A4C8FCB04EFA8C8847EEBBE4FB58245F41022AD54ED7240DF788A498B89
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                          • API String ID: 0-319646191
                                                                                          • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                          • Instruction ID: 4aacc78650e22b30901d95fb42784ad0fe3b73b6028c9e51f2f2916ee769220a
                                                                                          • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                          • Instruction Fuzzy Hash: 1821E1B0A14A4C8FCB04EFA9C8847EDBBE4FF58245F41422AE55AD7240DF74C649CB89
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .$l$l$t
                                                                                          • API String ID: 0-168566397
                                                                                          • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                          • Instruction ID: 7282ee8c354dcf5e3d4c25bf41b940b9fb84418d2f17d7b24fbfefdbd4998e4c
                                                                                          • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                          • Instruction Fuzzy Hash: 132148B0A28A0D9FDB08EFA8D0447EDBAF1FB58304F51462ED109D3600DB74D6518B84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .$l$l$t
                                                                                          • API String ID: 0-168566397
                                                                                          • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                          • Instruction ID: 3657e99e4c9e46a4fe5bd22fd4cd9fbc50c36580791b8f8c188b1f88da7ad210
                                                                                          • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                          • Instruction Fuzzy Hash: D6215AB0A28A0D9FDB48EFA8D0447AEBAF1FF58304F51462ED109D3610DB74D5918B84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898896086.000000000DC60000.00000040.00000001.00040000.00000000.sdmp, Offset: 0DC60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_dc60000_explorer.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: auth$logi$pass$user
                                                                                          • API String ID: 0-2393853802
                                                                                          • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                          • Instruction ID: cd78d772c48930ed60d1d748c16e2bac800d6a0a066dd4bf1adec733d32e2177
                                                                                          • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                          • Instruction Fuzzy Hash: 8F21C070628B0D8BCB05DF9998806EEB7E1EF88384F014619E40AEB249D7B1D9148BC2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:1.7%
                                                                                          Dynamic/Decrypted Code Coverage:2%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:592
                                                                                          Total number of Limit Nodes:69
                                                                                          execution_graph 96150 2d19070 96161 2d1bd30 96150->96161 96152 2d1918c 96153 2d190ab 96153->96152 96164 2d0ace0 96153->96164 96155 2d190e1 96169 2d14e40 96155->96169 96157 2d19110 Sleep 96160 2d190fd 96157->96160 96160->96152 96160->96157 96174 2d18c90 LdrLoadDll 96160->96174 96175 2d18ea0 LdrLoadDll 96160->96175 96176 2d1a530 96161->96176 96163 2d1bd5d 96163->96153 96166 2d0ad04 96164->96166 96165 2d0ad0b 96165->96155 96166->96165 96167 2d0ad40 LdrLoadDll 96166->96167 96168 2d0ad57 96166->96168 96167->96168 96168->96155 96170 2d14e4e 96169->96170 96172 2d14e5a 96169->96172 96170->96172 96183 2d152c0 LdrLoadDll 96170->96183 96172->96160 96173 2d14fac 96173->96160 96174->96160 96175->96160 96179 2d1af50 96176->96179 96178 2d1a54c NtAllocateVirtualMemory 96178->96163 96180 2d1af60 96179->96180 96182 2d1af82 96179->96182 96181 2d14e40 LdrLoadDll 96180->96181 96181->96182 96182->96178 96183->96173 96184 2d1f14d 96187 2d1b9c0 96184->96187 96188 2d1b9e6 96187->96188 96195 2d09d30 96188->96195 96190 2d1b9f2 96191 2d1ba16 96190->96191 96203 2d08f30 96190->96203 96241 2d1a6a0 96191->96241 96244 2d09c80 96195->96244 96197 2d09d3d 96198 2d09d44 96197->96198 96256 2d09c20 96197->96256 96198->96190 96204 2d08f57 96203->96204 96655 2d0b1b0 96204->96655 96206 2d08f69 96659 2d0af00 96206->96659 96208 2d08f86 96210 2d08f8d 96208->96210 96730 2d0ae30 LdrLoadDll 96208->96730 96237 2d090f2 96210->96237 96663 2d0f370 96210->96663 96212 2d08ffc 96675 2d0f400 96212->96675 96214 2d09006 96215 2d1bf80 2 API calls 96214->96215 96214->96237 96216 2d0902a 96215->96216 96217 2d1bf80 2 API calls 96216->96217 96218 2d0903b 96217->96218 96219 2d1bf80 2 API calls 96218->96219 96220 2d0904c 96219->96220 96687 2d0ca80 96220->96687 96222 2d09059 96223 2d14a40 8 API calls 96222->96223 96224 2d09066 96223->96224 96225 2d14a40 8 API calls 96224->96225 96226 2d09077 96225->96226 96227 2d09084 96226->96227 96228 2d090a5 96226->96228 96697 2d0d610 96227->96697 96230 2d14a40 8 API calls 96228->96230 96236 2d090c1 96230->96236 96233 2d090e9 96234 2d08d00 23 API calls 96233->96234 96234->96237 96235 2d09092 96713 2d08d00 96235->96713 96236->96233 96731 2d0d6b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 96236->96731 96237->96191 96242 2d1a6bf 96241->96242 96243 2d1af50 LdrLoadDll 96241->96243 96243->96242 96275 2d18bb0 96244->96275 96248 2d09ca6 96248->96197 96249 2d09c9c 96249->96248 96282 2d1b2a0 96249->96282 96251 2d09ce3 96251->96248 96293 2d09aa0 96251->96293 96253 2d09d03 96299 2d09620 LdrLoadDll 96253->96299 96255 2d09d15 96255->96197 96634 2d1b590 96256->96634 96259 2d1b590 LdrLoadDll 96260 2d09c4b 96259->96260 96261 2d1b590 LdrLoadDll 96260->96261 96262 2d09c61 96261->96262 96263 2d0f170 96262->96263 96264 2d0f189 96263->96264 96638 2d0b030 96264->96638 96266 2d0f19c 96642 2d1a1d0 96266->96642 96270 2d0f1c2 96273 2d0f1ed 96270->96273 96648 2d1a250 96270->96648 96272 2d1a480 2 API calls 96274 2d09d55 96272->96274 96273->96272 96274->96190 96276 2d18bbf 96275->96276 96277 2d14e40 LdrLoadDll 96276->96277 96278 2d09c93 96277->96278 96279 2d18a60 96278->96279 96300 2d1a5f0 96279->96300 96283 2d1b2b9 96282->96283 96303 2d14a40 96283->96303 96285 2d1b2d1 96286 2d1b2da 96285->96286 96342 2d1b0e0 96285->96342 96286->96251 96288 2d1b2ee 96288->96286 96360 2d19ef0 96288->96360 96612 2d07ea0 96293->96612 96295 2d09ac1 96295->96253 96296 2d09aba 96296->96295 96625 2d08160 96296->96625 96299->96255 96301 2d1af50 LdrLoadDll 96300->96301 96302 2d18a75 96301->96302 96302->96249 96304 2d14d75 96303->96304 96305 2d14a54 96303->96305 96304->96285 96305->96304 96368 2d19c40 96305->96368 96308 2d14b80 96371 2d1a350 96308->96371 96309 2d14b63 96428 2d1a450 LdrLoadDll 96309->96428 96312 2d14ba7 96314 2d1bdb0 2 API calls 96312->96314 96313 2d14b6d 96313->96285 96316 2d14bb3 96314->96316 96315 2d14d39 96318 2d1a480 2 API calls 96315->96318 96316->96313 96316->96315 96317 2d14d4f 96316->96317 96322 2d14c42 96316->96322 96437 2d14780 LdrLoadDll NtReadFile NtClose 96317->96437 96320 2d14d40 96318->96320 96320->96285 96321 2d14d62 96321->96285 96323 2d14ca9 96322->96323 96325 2d14c51 96322->96325 96323->96315 96324 2d14cbc 96323->96324 96430 2d1a2d0 96324->96430 96327 2d14c56 96325->96327 96328 2d14c6a 96325->96328 96429 2d14640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 96327->96429 96331 2d14c87 96328->96331 96332 2d14c6f 96328->96332 96331->96320 96386 2d14400 96331->96386 96374 2d146e0 96332->96374 96334 2d14c60 96334->96285 96337 2d14d1c 96434 2d1a480 96337->96434 96338 2d14c7d 96338->96285 96339 2d14c9f 96339->96285 96341 2d14d28 96341->96285 96343 2d1b0f1 96342->96343 96344 2d1b103 96343->96344 96345 2d1bd30 2 API calls 96343->96345 96344->96288 96346 2d1b124 96345->96346 96455 2d14060 96346->96455 96348 2d1b170 96348->96288 96349 2d1b147 96349->96348 96350 2d14060 3 API calls 96349->96350 96353 2d1b169 96350->96353 96352 2d1b1fa 96354 2d1b20a 96352->96354 96581 2d1aef0 LdrLoadDll 96352->96581 96353->96348 96487 2d15380 96353->96487 96497 2d1ad60 96354->96497 96357 2d1b238 96576 2d19eb0 96357->96576 96361 2d1af50 LdrLoadDll 96360->96361 96362 2d19f0c 96361->96362 96606 4cf2c0a 96362->96606 96363 2d19f27 96365 2d1bdb0 96363->96365 96609 2d1a660 96365->96609 96367 2d1b349 96367->96251 96369 2d1af50 LdrLoadDll 96368->96369 96370 2d14b34 96369->96370 96370->96308 96370->96309 96370->96313 96372 2d1af50 LdrLoadDll 96371->96372 96373 2d1a36c NtCreateFile 96372->96373 96373->96312 96375 2d146fc 96374->96375 96376 2d1a2d0 LdrLoadDll 96375->96376 96377 2d1471d 96376->96377 96378 2d14724 96377->96378 96379 2d14738 96377->96379 96381 2d1a480 2 API calls 96378->96381 96380 2d1a480 2 API calls 96379->96380 96382 2d14741 96380->96382 96383 2d1472d 96381->96383 96438 2d1bfc0 LdrLoadDll RtlAllocateHeap 96382->96438 96383->96338 96385 2d1474c 96385->96338 96387 2d1444b 96386->96387 96388 2d1447e 96386->96388 96390 2d1a2d0 LdrLoadDll 96387->96390 96389 2d145c9 96388->96389 96394 2d1449a 96388->96394 96391 2d1a2d0 LdrLoadDll 96389->96391 96392 2d14466 96390->96392 96398 2d145e4 96391->96398 96393 2d1a480 2 API calls 96392->96393 96395 2d1446f 96393->96395 96396 2d1a2d0 LdrLoadDll 96394->96396 96395->96339 96397 2d144b5 96396->96397 96400 2d144d1 96397->96400 96401 2d144bc 96397->96401 96451 2d1a310 LdrLoadDll 96398->96451 96404 2d144d6 96400->96404 96408 2d144ec 96400->96408 96403 2d1a480 2 API calls 96401->96403 96402 2d1461e 96405 2d1a480 2 API calls 96402->96405 96406 2d144c5 96403->96406 96407 2d1a480 2 API calls 96404->96407 96409 2d14629 96405->96409 96406->96339 96410 2d144df 96407->96410 96411 2d144f1 96408->96411 96439 2d1bf80 96408->96439 96409->96339 96410->96339 96415 2d14503 96411->96415 96442 2d1a400 96411->96442 96414 2d14557 96416 2d1456e 96414->96416 96450 2d1a290 LdrLoadDll 96414->96450 96415->96339 96417 2d14575 96416->96417 96418 2d1458a 96416->96418 96420 2d1a480 2 API calls 96417->96420 96421 2d1a480 2 API calls 96418->96421 96420->96415 96422 2d14593 96421->96422 96423 2d145bf 96422->96423 96445 2d1bb80 96422->96445 96423->96339 96425 2d145aa 96426 2d1bdb0 2 API calls 96425->96426 96427 2d145b3 96426->96427 96427->96339 96428->96313 96429->96334 96431 2d1af50 LdrLoadDll 96430->96431 96432 2d14d04 96431->96432 96433 2d1a310 LdrLoadDll 96432->96433 96433->96337 96435 2d1af50 LdrLoadDll 96434->96435 96436 2d1a49c NtClose 96435->96436 96436->96341 96437->96321 96438->96385 96452 2d1a620 96439->96452 96441 2d1bf98 96441->96411 96443 2d1af50 LdrLoadDll 96442->96443 96444 2d1a41c NtReadFile 96443->96444 96444->96414 96446 2d1bba4 96445->96446 96447 2d1bb8d 96445->96447 96446->96425 96447->96446 96448 2d1bf80 2 API calls 96447->96448 96449 2d1bbbb 96448->96449 96449->96425 96450->96416 96451->96402 96453 2d1a63c RtlAllocateHeap 96452->96453 96454 2d1af50 LdrLoadDll 96452->96454 96453->96441 96454->96453 96456 2d14071 96455->96456 96458 2d14079 96455->96458 96456->96349 96457 2d1434c 96457->96349 96458->96457 96582 2d1cf20 96458->96582 96460 2d140cd 96461 2d1cf20 2 API calls 96460->96461 96464 2d140d8 96461->96464 96462 2d14126 96465 2d1cf20 2 API calls 96462->96465 96464->96462 96466 2d1d050 3 API calls 96464->96466 96593 2d1cfc0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 96464->96593 96468 2d1413a 96465->96468 96466->96464 96467 2d14197 96469 2d1cf20 2 API calls 96467->96469 96468->96467 96587 2d1d050 96468->96587 96471 2d141ad 96469->96471 96472 2d141ea 96471->96472 96474 2d1d050 3 API calls 96471->96474 96473 2d1cf20 2 API calls 96472->96473 96475 2d141f5 96473->96475 96474->96471 96476 2d1d050 3 API calls 96475->96476 96482 2d1422f 96475->96482 96476->96475 96478 2d14324 96595 2d1cf80 LdrLoadDll RtlFreeHeap 96478->96595 96480 2d1432e 96596 2d1cf80 LdrLoadDll RtlFreeHeap 96480->96596 96594 2d1cf80 LdrLoadDll RtlFreeHeap 96482->96594 96483 2d14338 96597 2d1cf80 LdrLoadDll RtlFreeHeap 96483->96597 96485 2d14342 96598 2d1cf80 LdrLoadDll RtlFreeHeap 96485->96598 96488 2d15391 96487->96488 96489 2d14a40 8 API calls 96488->96489 96490 2d153a7 96489->96490 96491 2d153e2 96490->96491 96492 2d153f5 96490->96492 96496 2d153fa 96490->96496 96493 2d1bdb0 2 API calls 96491->96493 96494 2d1bdb0 2 API calls 96492->96494 96495 2d153e7 96493->96495 96494->96496 96495->96352 96496->96352 96498 2d1ad74 96497->96498 96499 2d1ac20 LdrLoadDll 96497->96499 96599 2d1ac20 96498->96599 96499->96498 96501 2d1ad7d 96502 2d1ac20 LdrLoadDll 96501->96502 96503 2d1ad86 96502->96503 96504 2d1ac20 LdrLoadDll 96503->96504 96505 2d1ad8f 96504->96505 96506 2d1ac20 LdrLoadDll 96505->96506 96507 2d1ad98 96506->96507 96508 2d1ac20 LdrLoadDll 96507->96508 96509 2d1ada1 96508->96509 96510 2d1ac20 LdrLoadDll 96509->96510 96511 2d1adad 96510->96511 96512 2d1ac20 LdrLoadDll 96511->96512 96513 2d1adb6 96512->96513 96514 2d1ac20 LdrLoadDll 96513->96514 96515 2d1adbf 96514->96515 96516 2d1ac20 LdrLoadDll 96515->96516 96517 2d1adc8 96516->96517 96518 2d1ac20 LdrLoadDll 96517->96518 96519 2d1add1 96518->96519 96520 2d1ac20 LdrLoadDll 96519->96520 96521 2d1adda 96520->96521 96522 2d1ac20 LdrLoadDll 96521->96522 96523 2d1ade6 96522->96523 96524 2d1ac20 LdrLoadDll 96523->96524 96525 2d1adef 96524->96525 96526 2d1ac20 LdrLoadDll 96525->96526 96527 2d1adf8 96526->96527 96528 2d1ac20 LdrLoadDll 96527->96528 96529 2d1ae01 96528->96529 96530 2d1ac20 LdrLoadDll 96529->96530 96531 2d1ae0a 96530->96531 96532 2d1ac20 LdrLoadDll 96531->96532 96533 2d1ae13 96532->96533 96534 2d1ac20 LdrLoadDll 96533->96534 96535 2d1ae1f 96534->96535 96536 2d1ac20 LdrLoadDll 96535->96536 96537 2d1ae28 96536->96537 96538 2d1ac20 LdrLoadDll 96537->96538 96539 2d1ae31 96538->96539 96540 2d1ac20 LdrLoadDll 96539->96540 96541 2d1ae3a 96540->96541 96542 2d1ac20 LdrLoadDll 96541->96542 96543 2d1ae43 96542->96543 96544 2d1ac20 LdrLoadDll 96543->96544 96545 2d1ae4c 96544->96545 96546 2d1ac20 LdrLoadDll 96545->96546 96547 2d1ae58 96546->96547 96548 2d1ac20 LdrLoadDll 96547->96548 96549 2d1ae61 96548->96549 96550 2d1ac20 LdrLoadDll 96549->96550 96551 2d1ae6a 96550->96551 96552 2d1ac20 LdrLoadDll 96551->96552 96553 2d1ae73 96552->96553 96554 2d1ac20 LdrLoadDll 96553->96554 96555 2d1ae7c 96554->96555 96556 2d1ac20 LdrLoadDll 96555->96556 96557 2d1ae85 96556->96557 96558 2d1ac20 LdrLoadDll 96557->96558 96559 2d1ae91 96558->96559 96560 2d1ac20 LdrLoadDll 96559->96560 96561 2d1ae9a 96560->96561 96562 2d1ac20 LdrLoadDll 96561->96562 96563 2d1aea3 96562->96563 96564 2d1ac20 LdrLoadDll 96563->96564 96565 2d1aeac 96564->96565 96566 2d1ac20 LdrLoadDll 96565->96566 96567 2d1aeb5 96566->96567 96568 2d1ac20 LdrLoadDll 96567->96568 96569 2d1aebe 96568->96569 96570 2d1ac20 LdrLoadDll 96569->96570 96571 2d1aeca 96570->96571 96572 2d1ac20 LdrLoadDll 96571->96572 96573 2d1aed3 96572->96573 96574 2d1ac20 LdrLoadDll 96573->96574 96575 2d1aedc 96574->96575 96575->96357 96577 2d1af50 LdrLoadDll 96576->96577 96578 2d19ecc 96577->96578 96605 4cf2df0 LdrInitializeThunk 96578->96605 96579 2d19ee3 96579->96288 96581->96354 96583 2d1cf30 96582->96583 96584 2d1cf36 96582->96584 96583->96460 96585 2d1bf80 2 API calls 96584->96585 96586 2d1cf5c 96585->96586 96586->96460 96588 2d1cfc0 96587->96588 96589 2d1bf80 2 API calls 96588->96589 96592 2d1d01d 96588->96592 96590 2d1cffa 96589->96590 96591 2d1bdb0 2 API calls 96590->96591 96591->96592 96592->96468 96593->96464 96594->96478 96595->96480 96596->96483 96597->96485 96598->96457 96600 2d1ac3b 96599->96600 96601 2d14e40 LdrLoadDll 96600->96601 96602 2d1ac5b 96601->96602 96603 2d14e40 LdrLoadDll 96602->96603 96604 2d1ad07 96602->96604 96603->96604 96604->96501 96604->96604 96605->96579 96607 4cf2c1f LdrInitializeThunk 96606->96607 96608 4cf2c11 96606->96608 96607->96363 96608->96363 96610 2d1af50 LdrLoadDll 96609->96610 96611 2d1a67c RtlFreeHeap 96610->96611 96611->96367 96613 2d07eb0 96612->96613 96614 2d07eab 96612->96614 96615 2d1bd30 2 API calls 96613->96615 96614->96296 96618 2d07ed5 96615->96618 96616 2d07f38 96616->96296 96617 2d19eb0 2 API calls 96617->96618 96618->96616 96618->96617 96619 2d07f3e 96618->96619 96624 2d1bd30 2 API calls 96618->96624 96628 2d1a5b0 96618->96628 96620 2d07f64 96619->96620 96622 2d1a5b0 2 API calls 96619->96622 96620->96296 96623 2d07f55 96622->96623 96623->96296 96624->96618 96626 2d0817e 96625->96626 96627 2d1a5b0 2 API calls 96625->96627 96626->96253 96627->96626 96629 2d1af50 LdrLoadDll 96628->96629 96630 2d1a5cc 96629->96630 96633 4cf2c70 LdrInitializeThunk 96630->96633 96631 2d1a5e3 96631->96618 96633->96631 96635 2d1b5b3 96634->96635 96636 2d0ace0 LdrLoadDll 96635->96636 96637 2d09c3a 96636->96637 96637->96259 96639 2d0b053 96638->96639 96641 2d0b0d0 96639->96641 96653 2d19c80 LdrLoadDll 96639->96653 96641->96266 96643 2d1af50 LdrLoadDll 96642->96643 96644 2d0f1ab 96643->96644 96644->96274 96645 2d1a7c0 96644->96645 96646 2d1af50 LdrLoadDll 96645->96646 96647 2d1a7df LookupPrivilegeValueW 96646->96647 96647->96270 96649 2d1af50 LdrLoadDll 96648->96649 96650 2d1a26c 96649->96650 96654 4cf2ea0 LdrInitializeThunk 96650->96654 96651 2d1a28b 96651->96273 96653->96641 96654->96651 96656 2d0b1b9 96655->96656 96657 2d0b030 LdrLoadDll 96656->96657 96658 2d0b1f4 96657->96658 96658->96206 96660 2d0af24 96659->96660 96732 2d19c80 LdrLoadDll 96660->96732 96662 2d0af5e 96662->96208 96664 2d0f39c 96663->96664 96665 2d0b1b0 LdrLoadDll 96664->96665 96666 2d0f3ae 96665->96666 96733 2d0f280 96666->96733 96669 2d0f3c9 96672 2d1a480 2 API calls 96669->96672 96673 2d0f3d4 96669->96673 96670 2d0f3f2 96670->96212 96671 2d0f3e1 96671->96670 96674 2d1a480 2 API calls 96671->96674 96672->96673 96673->96212 96674->96670 96676 2d0f42c 96675->96676 96752 2d0b2a0 96676->96752 96678 2d0f43e 96679 2d0f280 3 API calls 96678->96679 96680 2d0f44f 96679->96680 96681 2d0f459 96680->96681 96683 2d0f471 96680->96683 96684 2d0f464 96681->96684 96685 2d1a480 2 API calls 96681->96685 96682 2d0f482 96682->96214 96683->96682 96686 2d1a480 2 API calls 96683->96686 96684->96214 96685->96684 96686->96682 96688 2d0ca96 96687->96688 96689 2d0caa0 96687->96689 96688->96222 96690 2d0af00 LdrLoadDll 96689->96690 96691 2d0cb3e 96690->96691 96692 2d0cb64 96691->96692 96693 2d0b030 LdrLoadDll 96691->96693 96692->96222 96694 2d0cb80 96693->96694 96695 2d14a40 8 API calls 96694->96695 96696 2d0cbd5 96695->96696 96696->96222 96698 2d0d636 96697->96698 96699 2d0b030 LdrLoadDll 96698->96699 96700 2d0d64a 96699->96700 96756 2d0d300 96700->96756 96702 2d0908b 96703 2d0cbf0 96702->96703 96704 2d0cc16 96703->96704 96705 2d0b030 LdrLoadDll 96704->96705 96706 2d0cc99 96704->96706 96705->96706 96707 2d0b030 LdrLoadDll 96706->96707 96708 2d0cd06 96707->96708 96709 2d0af00 LdrLoadDll 96708->96709 96710 2d0cd6f 96709->96710 96711 2d0b030 LdrLoadDll 96710->96711 96712 2d0ce1f 96711->96712 96712->96235 96716 2d08d14 96713->96716 96785 2d0f6c0 96713->96785 96715 2d08f25 96715->96191 96716->96715 96790 2d14390 96716->96790 96718 2d08d70 96718->96715 96793 2d08ab0 96718->96793 96721 2d1cf20 2 API calls 96722 2d08db2 96721->96722 96723 2d1d050 3 API calls 96722->96723 96727 2d08dc7 96723->96727 96724 2d07ea0 4 API calls 96724->96727 96727->96715 96727->96724 96728 2d0c7a0 18 API calls 96727->96728 96729 2d08160 2 API calls 96727->96729 96798 2d0f660 96727->96798 96802 2d0f070 21 API calls 96727->96802 96728->96727 96729->96727 96730->96210 96731->96233 96732->96662 96734 2d0f29a 96733->96734 96742 2d0f350 96733->96742 96735 2d0b030 LdrLoadDll 96734->96735 96736 2d0f2bc 96735->96736 96743 2d19f30 96736->96743 96738 2d0f2fe 96746 2d19f70 96738->96746 96741 2d1a480 2 API calls 96741->96742 96742->96669 96742->96671 96744 2d1af50 LdrLoadDll 96743->96744 96745 2d19f4c 96744->96745 96745->96738 96747 2d1af50 LdrLoadDll 96746->96747 96748 2d19f8c 96747->96748 96751 4cf35c0 LdrInitializeThunk 96748->96751 96749 2d0f344 96749->96741 96751->96749 96753 2d0b2c7 96752->96753 96754 2d0b030 LdrLoadDll 96753->96754 96755 2d0b303 96754->96755 96755->96678 96757 2d0d317 96756->96757 96765 2d0f700 96757->96765 96761 2d0d392 96761->96702 96762 2d0d38b 96762->96761 96776 2d1a290 LdrLoadDll 96762->96776 96764 2d0d3a5 96764->96702 96766 2d0f725 96765->96766 96777 2d081a0 96766->96777 96768 2d0d35f 96773 2d1a6d0 96768->96773 96769 2d0f749 96769->96768 96770 2d14a40 8 API calls 96769->96770 96772 2d1bdb0 2 API calls 96769->96772 96784 2d0f540 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 96769->96784 96770->96769 96772->96769 96774 2d1af50 LdrLoadDll 96773->96774 96775 2d1a6ef CreateProcessInternalW 96774->96775 96775->96762 96776->96764 96778 2d0829f 96777->96778 96779 2d081b5 96777->96779 96778->96769 96779->96778 96780 2d14a40 8 API calls 96779->96780 96781 2d08222 96780->96781 96782 2d1bdb0 2 API calls 96781->96782 96783 2d08249 96781->96783 96782->96783 96783->96769 96784->96769 96786 2d14e40 LdrLoadDll 96785->96786 96787 2d0f6df 96786->96787 96788 2d0f6e6 SetErrorMode 96787->96788 96789 2d0f6ed 96787->96789 96788->96789 96789->96716 96803 2d0f490 96790->96803 96792 2d143b6 96792->96718 96794 2d1bd30 2 API calls 96793->96794 96796 2d08ad5 96794->96796 96795 2d08cea 96795->96721 96796->96795 96822 2d19870 96796->96822 96799 2d0f673 96798->96799 96870 2d19e80 96799->96870 96802->96727 96804 2d0f4ad 96803->96804 96810 2d19fb0 96804->96810 96807 2d0f4f5 96807->96792 96811 2d1af50 LdrLoadDll 96810->96811 96812 2d19fcc 96811->96812 96820 4cf2f30 LdrInitializeThunk 96812->96820 96813 2d0f4ee 96813->96807 96815 2d1a000 96813->96815 96816 2d1af50 LdrLoadDll 96815->96816 96817 2d1a01c 96816->96817 96821 4cf2d10 LdrInitializeThunk 96817->96821 96818 2d0f51e 96818->96792 96820->96813 96821->96818 96823 2d1bf80 2 API calls 96822->96823 96824 2d19887 96823->96824 96843 2d09310 96824->96843 96826 2d198a2 96827 2d198e0 96826->96827 96828 2d198c9 96826->96828 96831 2d1bd30 2 API calls 96827->96831 96829 2d1bdb0 2 API calls 96828->96829 96830 2d198d6 96829->96830 96830->96795 96832 2d1991a 96831->96832 96833 2d1bd30 2 API calls 96832->96833 96836 2d19933 96833->96836 96835 2d19bb9 96837 2d19bc0 96835->96837 96840 2d19bd4 96835->96840 96836->96840 96849 2d1bd70 LdrLoadDll 96836->96849 96838 2d1bdb0 2 API calls 96837->96838 96839 2d19bca 96838->96839 96839->96795 96841 2d1bdb0 2 API calls 96840->96841 96842 2d19c29 96841->96842 96842->96795 96844 2d09335 96843->96844 96845 2d0ace0 LdrLoadDll 96844->96845 96846 2d09368 96845->96846 96848 2d0938d 96846->96848 96850 2d0cf10 96846->96850 96848->96826 96849->96835 96851 2d0cf11 96850->96851 96852 2d1a1d0 LdrLoadDll 96851->96852 96853 2d0cf55 96852->96853 96854 2d0cf5c 96853->96854 96861 2d1a210 96853->96861 96854->96848 96858 2d0cf97 96859 2d1a480 2 API calls 96858->96859 96860 2d0cfba 96859->96860 96860->96848 96862 2d1af50 LdrLoadDll 96861->96862 96863 2d1a22c 96862->96863 96869 4cf2ca0 LdrInitializeThunk 96863->96869 96864 2d0cf7f 96864->96854 96866 2d1a800 96864->96866 96867 2d1af50 LdrLoadDll 96866->96867 96868 2d1a81f 96867->96868 96868->96858 96869->96864 96871 2d1af50 LdrLoadDll 96870->96871 96872 2d19e9c 96871->96872 96875 4cf2dd0 LdrInitializeThunk 96872->96875 96873 2d0f69e 96873->96727 96875->96873 96876 4cf2ad0 LdrInitializeThunk

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 284 2d1a350-2d1a3a1 call 2d1af50 NtCreateFile
                                                                                          APIs
                                                                                          • NtCreateFile.NTDLL(00000060,00000000,.z`,02D14BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,02D14BA7,007A002E,00000000,00000060,00000000,00000000), ref: 02D1A39D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID: .z`
                                                                                          • API String ID: 823142352-1441809116
                                                                                          • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                          • Instruction ID: 992cdf03515f09ac965a2d75daba868a4ebc3fb2814bfa18f44f924eebf09515
                                                                                          • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                          • Instruction Fuzzy Hash: 48F0BDB2205208AFCB08CF88DC84EEB77ADAF8C754F158248BA1D97240C630E811CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtReadFile.NTDLL(02D14D62,5EB65239,FFFFFFFF,02D14A21,?,?,02D14D62,?,02D14A21,FFFFFFFF,5EB65239,02D14D62,?,00000000), ref: 02D1A445
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FileRead
                                                                                          • String ID:
                                                                                          • API String ID: 2738559852-0
                                                                                          • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                          • Instruction ID: daa22aa87ee568699752004377fa16c79f935de87df349c5d842af18f00ba5a7
                                                                                          • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                          • Instruction Fuzzy Hash: 90F0A4B2200208AFCB14DF89DC80EEB77ADEF8C754F158248BA1D97241D630E811CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,02D02D11,00002000,00003000,00000004), ref: 02D1A569
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateMemoryVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2167126740-0
                                                                                          • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                          • Instruction ID: 231519c56c863cffc34497dae8c512d49099663aaa1c0b9ef9b384fbb1b85e20
                                                                                          • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                          • Instruction Fuzzy Hash: 75F015B2200208AFCB14DF89DC80EAB77ADEF88754F118148BE1C97241C630F810CBB0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,02D02D11,00002000,00003000,00000004), ref: 02D1A569
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateMemoryVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 2167126740-0
                                                                                          • Opcode ID: 33da857c462814b0e4859ef38ad2c50ccbd1735164ec33851ee6405a57418289
                                                                                          • Instruction ID: 2a1bcc7a6fd5305e4837e86e54576c2e97793d38ef4c175438bde1db59949e4d
                                                                                          • Opcode Fuzzy Hash: 33da857c462814b0e4859ef38ad2c50ccbd1735164ec33851ee6405a57418289
                                                                                          • Instruction Fuzzy Hash: EEF0F8B6204208ABDB18DF98DC91EE777ADAF88354F158558BE1C97351C630E810CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtClose.NTDLL(02D14D40,?,?,02D14D40,00000000,FFFFFFFF), ref: 02D1A4A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close
                                                                                          • String ID:
                                                                                          • API String ID: 3535843008-0
                                                                                          • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                          • Instruction ID: 12132a1861f714b41f214c5f6cd7b617759e7a39c7aecd9dd15cc2eecb3d2287
                                                                                          • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                          • Instruction Fuzzy Hash: F8D01776200214BBD710EB98DC85EA77BADEF48760F154499BA1C9B282C530FA008AE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtClose.NTDLL(02D14D40,?,?,02D14D40,00000000,FFFFFFFF), ref: 02D1A4A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close
                                                                                          • String ID:
                                                                                          • API String ID: 3535843008-0
                                                                                          • Opcode ID: 594407e538b1f9566720a9a90d53dc7d757fc1ab6a3dc681645b6378f76722ac
                                                                                          • Instruction ID: db560b514274d991ff86fef5313a1887d5f10783c00d6554f01cd4e4b2cfc0a4
                                                                                          • Opcode Fuzzy Hash: 594407e538b1f9566720a9a90d53dc7d757fc1ab6a3dc681645b6378f76722ac
                                                                                          • Instruction Fuzzy Hash: 81E0C2722402007FD710EBD4CC45F977768EF44720F044494BA2C9B241C130EA00C7E0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: cad2d157d1e6751325728a876b3668651be609e39b53e6a139b29ad03fdbc03c
                                                                                          • Instruction ID: a67d49f40ae3f42f97ffba35c4a9def4120cb421ec5f41292fc8c4e6cc315b92
                                                                                          • Opcode Fuzzy Hash: cad2d157d1e6751325728a876b3668651be609e39b53e6a139b29ad03fdbc03c
                                                                                          • Instruction Fuzzy Hash: C990023120180442F2007598540874600158BE0305F55D011B50257A9EC665D9917131
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2ab842d349ae8b8a43137ab9275d7c417e2b2b760d76e8b23284f4db3380a0f2
                                                                                          • Instruction ID: c055f587a261cca64786cce60e3dcd10e79e1cc27a1b3b9b3538ff6e1709690f
                                                                                          • Opcode Fuzzy Hash: 2ab842d349ae8b8a43137ab9275d7c417e2b2b760d76e8b23284f4db3380a0f2
                                                                                          • Instruction Fuzzy Hash: 6990023120180882F20071584404B4600158BE0305F55C016B01257A8D8615D9517521
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: bbc464c21b4cd3648ea77b298b3ca4f0b80f08f719b598ab34adf3c18724a8ba
                                                                                          • Instruction ID: 7c1ff31da75bf5a1b50863846ff4422f2f829655e4c32a5572f9b884211ed1c8
                                                                                          • Opcode Fuzzy Hash: bbc464c21b4cd3648ea77b298b3ca4f0b80f08f719b598ab34adf3c18724a8ba
                                                                                          • Instruction Fuzzy Hash: 9190023120188842F2107158840474A00158BD0305F59C411B44257ACD8695D9917121
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 0a032b3e4837fc6d833bd9b533a4f55eeccac268f222c76bfd161b7b7eff1977
                                                                                          • Instruction ID: bb2964115a2e787e35826c85e7a4a4764fa18c15c7a36337023d552f67ccb3ca
                                                                                          • Opcode Fuzzy Hash: 0a032b3e4837fc6d833bd9b533a4f55eeccac268f222c76bfd161b7b7eff1977
                                                                                          • Instruction Fuzzy Hash: AD900221242841927645B158440460740169BE0245795C012B1415BA4C8526E956E621
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: a597123cd0e3da110d7f68d87f38e574099e444e4850e96774553ad89d860c19
                                                                                          • Instruction ID: db5f5c0730b142495de8a17d0598306b3e0507acb4d745df603ed244ba82a1d5
                                                                                          • Opcode Fuzzy Hash: a597123cd0e3da110d7f68d87f38e574099e444e4850e96774553ad89d860c19
                                                                                          • Instruction Fuzzy Hash: E790023120180453F2117158450470700198BD0245F95C412B04257ACD9656DA52B121
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: c0719a6545358dc19fcfb88aef3bf364856a00b7f52d9bc0a3c0efa40b79e43e
                                                                                          • Instruction ID: aa4d9e013b21e2aac356a1c5c5c87c3aaea79c38020e22c2cdb972856753c4e9
                                                                                          • Opcode Fuzzy Hash: c0719a6545358dc19fcfb88aef3bf364856a00b7f52d9bc0a3c0efa40b79e43e
                                                                                          • Instruction Fuzzy Hash: B390022921380042F2807158540870A00158BD1206F95D415B00167ACCC915D9696321
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 434118f6801fd743fc2a244d7a3cdbb27c4714a422cdf3370e574d0cbddd805d
                                                                                          • Instruction ID: 8eb0abc5ef30fc6265280be6b84813ee8dd63d17e5878807848cd78b07597898
                                                                                          • Opcode Fuzzy Hash: 434118f6801fd743fc2a244d7a3cdbb27c4714a422cdf3370e574d0cbddd805d
                                                                                          • Instruction Fuzzy Hash: 7390027120180442F2407158440474600158BD0305F55C011B50657A8E8659DED57665
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 4994d3940b1c89adfe7947a7e39f37d46ec311c579123323b5c534d4d11b4536
                                                                                          • Instruction ID: 0489fdaf3834d3d6380885c73666489789ead80b4d2cff6e2031831b90e471a3
                                                                                          • Opcode Fuzzy Hash: 4994d3940b1c89adfe7947a7e39f37d46ec311c579123323b5c534d4d11b4536
                                                                                          • Instruction Fuzzy Hash: 7E900221211C0082F30075684C14B0700158BD0307F55C115B01557A8CC915D9616521
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 923cf47ff4789abf966886f86de803ab5ff9519bac52b83d55b35aee2ee153ce
                                                                                          • Instruction ID: 002f93877fc08266e5d1cafaf259c32467cd442714c0aede44df1596273bfe90
                                                                                          • Opcode Fuzzy Hash: 923cf47ff4789abf966886f86de803ab5ff9519bac52b83d55b35aee2ee153ce
                                                                                          • Instruction Fuzzy Hash: 5D90026134180482F20071584414B060015CBE1305F55C015F10657A8D8619DD527126
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 6e0369f26a8f4cb7509d64353a6391326be871613e29a6e294d257e07b8c5b6f
                                                                                          • Instruction ID: e254a2984fba97ad2d011269b6a2056c159bfd3f9848230ac2ce54f3164e9de8
                                                                                          • Opcode Fuzzy Hash: 6e0369f26a8f4cb7509d64353a6391326be871613e29a6e294d257e07b8c5b6f
                                                                                          • Instruction Fuzzy Hash: BD900225211800432205B558070460700568BD5355355C021F10167A4CD621D9616121
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 0ab1139cabdff37981711a05e8616be824202f646e931e6019ad1b76079a5d0c
                                                                                          • Instruction ID: 6936d486bfdd80e03389b55fecbb4a0561fe55d729cb10915e20db36f7eab3f1
                                                                                          • Opcode Fuzzy Hash: 0ab1139cabdff37981711a05e8616be824202f646e931e6019ad1b76079a5d0c
                                                                                          • Instruction Fuzzy Hash: 5190023120584882F24071584404B4600258BD0309F55C011B00657E8D9625DE55B661
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: d68aee0bee843c213ed35da9c55dd7d0f2a79f008ece3e089ba4fa1055ea34f1
                                                                                          • Instruction ID: 446626967acd2366cbe4b91106bf472cd0f02318aa6c1d160230f0ba403d300a
                                                                                          • Opcode Fuzzy Hash: d68aee0bee843c213ed35da9c55dd7d0f2a79f008ece3e089ba4fa1055ea34f1
                                                                                          • Instruction Fuzzy Hash: 2A90023120180842F2807158440474A00158BD1305F95C015B00267A8DCA15DB5977A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 3ebddd25f4c38799794823ddad13f516e24a388608bd2e6b4f5cd306d63f36df
                                                                                          • Instruction ID: b89428d2f7d15ebd010d5bdc964d29aa6319f37c8801b7cbe64400244b938b4b
                                                                                          • Opcode Fuzzy Hash: 3ebddd25f4c38799794823ddad13f516e24a388608bd2e6b4f5cd306d63f36df
                                                                                          • Instruction Fuzzy Hash: 5F90026120280043620571584414716401A8BE0205B55C021F10157E4DC525D9917125
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 72a2945cedcfb5bae48ea0b3c27de3efff9c865076907e6a31d2cf3ff6acd66f
                                                                                          • Instruction ID: cdd719653258214fca245bb8f5857bd6844fba96ba10640bb0e7ed19eeb91dee
                                                                                          • Opcode Fuzzy Hash: 72a2945cedcfb5bae48ea0b3c27de3efff9c865076907e6a31d2cf3ff6acd66f
                                                                                          • Instruction Fuzzy Hash: 6D90023160590442F2007158451470610158BD0205F65C411B04257BCD8795DA5175A2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 243 2d19070-2d190b2 call 2d1bd30 246 2d190b8-2d19108 call 2d1be00 call 2d0ace0 call 2d14e40 243->246 247 2d1918c-2d19192 243->247 254 2d19110-2d19121 Sleep 246->254 255 2d19123-2d19129 254->255 256 2d19186-2d1918a 254->256 257 2d19153-2d19174 call 2d18ea0 255->257 258 2d1912b-2d19151 call 2d18c90 255->258 256->247 256->254 262 2d19179-2d1917c 257->262 258->262 262->256
                                                                                          APIs
                                                                                          • Sleep.KERNELBASE(000007D0), ref: 02D19118
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID: net.dll$wininet.dll
                                                                                          • API String ID: 3472027048-1269752229
                                                                                          • Opcode ID: 63544d63867e708e1faaf78ebc484f48dacde3a693dafda3e76a5f8c98e06fb1
                                                                                          • Instruction ID: 296e6fc5989ffa04bee114f8b2ce7e3549916f0b2a336a0ee23c6a645a3f4ebe
                                                                                          • Opcode Fuzzy Hash: 63544d63867e708e1faaf78ebc484f48dacde3a693dafda3e76a5f8c98e06fb1
                                                                                          • Instruction Fuzzy Hash: 1A3192B2A00704BBC714DF64D895FA7B7B9FB48704F00841DF62A9B745D730A990CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 263 2d19066-2d190b2 call 2d1bd30 267 2d190b8-2d19108 call 2d1be00 call 2d0ace0 call 2d14e40 263->267 268 2d1918c-2d19192 263->268 275 2d19110-2d19121 Sleep 267->275 276 2d19123-2d19129 275->276 277 2d19186-2d1918a 275->277 278 2d19153-2d19174 call 2d18ea0 276->278 279 2d1912b-2d19151 call 2d18c90 276->279 277->268 277->275 283 2d19179-2d1917c 278->283 279->283 283->277
                                                                                          APIs
                                                                                          • Sleep.KERNELBASE(000007D0), ref: 02D19118
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID: net.dll$wininet.dll
                                                                                          • API String ID: 3472027048-1269752229
                                                                                          • Opcode ID: 729fe682efe5728c2841d965815c6af81b50c465cbb92764371d1af27dedde08
                                                                                          • Instruction ID: 028ce08874d6d55709d7239829ff1667e28fd47be6e4e96a83e75e43770e80e4
                                                                                          • Opcode Fuzzy Hash: 729fe682efe5728c2841d965815c6af81b50c465cbb92764371d1af27dedde08
                                                                                          • Instruction Fuzzy Hash: E621D3B2A00304BBC714DF64D895FA7B7B9FB88B04F10806DE62D6B745D774A990CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 287 2d1a660-2d1a691 call 2d1af50 RtlFreeHeap
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,02D03AF8), ref: 02D1A68D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID: .z`
                                                                                          • API String ID: 3298025750-1441809116
                                                                                          • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                          • Instruction ID: 13be10698d3b32098bb0669d8397b7aa3cb922286f032bfa669dec162d7d322c
                                                                                          • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                          • Instruction Fuzzy Hash: 89E01AB12002046BD714DF59DC44EA777ADEF88750F014554B91C57241C630E910CAB0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(02D14526,?,02D14C9F,02D14C9F,?,02D14526,?,?,?,?,?,00000000,00000000,?), ref: 02D1A64D
                                                                                          • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 02D1A724
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateCreateHeapInternalProcess
                                                                                          • String ID:
                                                                                          • API String ID: 2739015735-0
                                                                                          • Opcode ID: 5b025f88ea3bda87434fa5d71af327bfb2fa51a71bf5852b116d0f3eb41bb745
                                                                                          • Instruction ID: 7871b7b81bffe7516d621aa77634c48a599aef687dc66514d8bc97016a8c7451
                                                                                          • Opcode Fuzzy Hash: 5b025f88ea3bda87434fa5d71af327bfb2fa51a71bf5852b116d0f3eb41bb745
                                                                                          • Instruction Fuzzy Hash: C2117CB6204248AFCB14DFA8EC80DEB77A9EF88354F118649F95C97642D230E915CBB0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 300 2d0830a-2d0830c 301 2d08295-2d0829e 300->301 302 2d0830e-2d0831f 300->302 304 2d08328-2d0835a call 2d1c9f0 call 2d0ace0 call 2d14e40 302->304 305 2d08323 call 2d1be50 302->305 312 2d0835c-2d0836e PostThreadMessageW 304->312 313 2d0838e-2d08392 304->313 305->304 314 2d08370-2d0838b call 2d0a470 PostThreadMessageW 312->314 315 2d0838d 312->315 314->315 315->313
                                                                                          APIs
                                                                                          • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 02D0836A
                                                                                          • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 02D0838B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessagePostThread
                                                                                          • String ID:
                                                                                          • API String ID: 1836367815-0
                                                                                          • Opcode ID: a537377ecf182b2fc080ada04841690dc36ee8b9f89dc4df97134160b96f0336
                                                                                          • Instruction ID: 980c6f7a1a95902c7b2973908b4950aad875e0ddec363e349c8a297a0513c563
                                                                                          • Opcode Fuzzy Hash: a537377ecf182b2fc080ada04841690dc36ee8b9f89dc4df97134160b96f0336
                                                                                          • Instruction Fuzzy Hash: A0016D31A8031877E720A6A49C42FFE7B5CEB40B65F050219FF04FA2C0E6906D0547F2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 02D0836A
                                                                                          • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 02D0838B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessagePostThread
                                                                                          • String ID:
                                                                                          • API String ID: 1836367815-0
                                                                                          • Opcode ID: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                                                                          • Instruction ID: d398a77994dd978c694459fd00d3229bf19d4823f252c3f15d9cf14ff28974e8
                                                                                          • Opcode Fuzzy Hash: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                                                                          • Instruction Fuzzy Hash: 5E01A271A8032877E720A6949C42FBE7B6DAB40B51F050119FF04FA2C1E6A46D064AF6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 528 2d0ace0-2d0ad09 call 2d1cc40 531 2d0ad0b-2d0ad0e 528->531 532 2d0ad0f-2d0ad1d call 2d1d060 528->532 535 2d0ad2d-2d0ad3e call 2d1b490 532->535 536 2d0ad1f-2d0ad2a call 2d1d2e0 532->536 541 2d0ad40-2d0ad54 LdrLoadDll 535->541 542 2d0ad57-2d0ad5a 535->542 536->535 541->542
                                                                                          APIs
                                                                                          • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 02D0AD52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Load
                                                                                          • String ID:
                                                                                          • API String ID: 2234796835-0
                                                                                          • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                          • Instruction ID: 5c7486b2481488ee22b3b509f8f24ec3366634ea6caae0a7683ef8f12fc362c2
                                                                                          • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                          • Instruction Fuzzy Hash: A8011EB5D4020DBBDB10EBA4EC81F9DB3799B54308F108195EA1897691FA71EB14CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 543 2d1a6d0-2d1a728 call 2d1af50 CreateProcessInternalW
                                                                                          APIs
                                                                                          • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 02D1A724
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateInternalProcess
                                                                                          • String ID:
                                                                                          • API String ID: 2186235152-0
                                                                                          • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                          • Instruction ID: 5634c860641a18d7dcfee9ee7e6547cfa96c235a4beba38ad5e7fa8a2dd32884
                                                                                          • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                          • Instruction Fuzzy Hash: 3501AFB2214108BFCB54DF89DC80EEB77ADAF8C754F158258BA0D97240C630E851CBA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 546 2d191a0-2d191bb 547 2d191c1-2d191c8 546->547 548 2d191bc call 2d14e40 546->548 549 2d191e7-2d191ec 547->549 550 2d191ca-2d191e6 call 2d1f262 CreateThread 547->550 548->547
                                                                                          APIs
                                                                                          • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,02D0F040,?,?,00000000), ref: 02D191DC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2422867632-0
                                                                                          • Opcode ID: 99fcb9b7b30df4d86e90b5a4a83c6d9f27f324d9dc8e82fa5e5eb4eedb0108d3
                                                                                          • Instruction ID: 05eb47d60007443647e3d7ef5c60f22c137b7ac696d90f5bbaec0cc953bae541
                                                                                          • Opcode Fuzzy Hash: 99fcb9b7b30df4d86e90b5a4a83c6d9f27f324d9dc8e82fa5e5eb4eedb0108d3
                                                                                          • Instruction Fuzzy Hash: 25E06D773903043AE7206599AC02FA7B79CCB81B20F140026FA0DEB6C1D595F84146A4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,02D0F040,?,?,00000000), ref: 02D191DC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2422867632-0
                                                                                          • Opcode ID: 1a206c8d9fcdfea0510d65a40b9c2929398dddbd67c1927ca782344703e3b693
                                                                                          • Instruction ID: d8a76bfb58d8f992603d20ee0beae535c64492bc1048a8726db551a670521f9c
                                                                                          • Opcode Fuzzy Hash: 1a206c8d9fcdfea0510d65a40b9c2929398dddbd67c1927ca782344703e3b693
                                                                                          • Instruction Fuzzy Hash: 2FF02B763843403EE73116646C12FF77B98CF81B14F280469FA8AEB6C2C590F941C764
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,02D0F1C2,02D0F1C2,?,00000000,?,?), ref: 02D1A7F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 146d5d7056201c599327c081de4fb7bf43f31d08d31235cc8598b721e0cb3f52
                                                                                          • Instruction ID: 6b56ec6c71209c7918019680efd7bea0749874c58a25e08e66213c789a849c06
                                                                                          • Opcode Fuzzy Hash: 146d5d7056201c599327c081de4fb7bf43f31d08d31235cc8598b721e0cb3f52
                                                                                          • Instruction Fuzzy Hash: 4EF0E5B5608240AFC710DF54D844D973BA8EF80314F00456EFC695B642C731D405CBB4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(02D14526,?,02D14C9F,02D14C9F,?,02D14526,?,?,?,?,?,00000000,00000000,?), ref: 02D1A64D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                          • Instruction ID: 255c720f24d8a9bfb369edafea2f58736996c5bb4a230374e54148da0c8e1a6f
                                                                                          • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                          • Instruction Fuzzy Hash: 42E012B2200208ABDB14EF99DC40EA777ADEF88664F118558BA1C5B281C630F910CAB0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,02D0F1C2,02D0F1C2,?,00000000,?,?), ref: 02D1A7F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                          • Instruction ID: d598cf3c8664a5636306b5b4d451fe7e736eea7696476d464a082d5d10c0b39f
                                                                                          • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                          • Instruction Fuzzy Hash: DCE01AB12002086BDB10DF49DC84EE737ADEF88650F018154BA0C57241C930E8108BF5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetErrorMode.KERNELBASE(00008003,?,02D08D14,?), ref: 02D0F6EB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3884191751.0000000002D00000.00000040.80000000.00040000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_2d00000_systray.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorMode
                                                                                          • String ID:
                                                                                          • API String ID: 2340568224-0
                                                                                          • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                          • Instruction ID: 7160e39cdc46d455e451a8c6142044775f2dc658b253360d4fcae8af81a150d2
                                                                                          • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                          • Instruction Fuzzy Hash: 7AD05E626503043BE610BAA49C02F2632899B44B04F490064F948D73C3D954E4008565
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: c0a3823ade9e2523651450298e355a1b779921e72c4977446f1e9dfbc823fa27
                                                                                          • Instruction ID: 746429c492c33ab83f9abea5874e1eb6aafd94d7997851d8b48786f7e9df376c
                                                                                          • Opcode Fuzzy Hash: c0a3823ade9e2523651450298e355a1b779921e72c4977446f1e9dfbc823fa27
                                                                                          • Instruction Fuzzy Hash: 8CB09B719019C5C5FB51F7604A087177911ABD0705F16C061E3030795E473DD1D1F175
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                          • API String ID: 48624451-2108815105
                                                                                          • Opcode ID: b7f0382918bdbae068f7aff175de01963f899d42ffafcc9a81e5a594352018fa
                                                                                          • Instruction ID: 32626f1a50f58025f35c7e402ac6e114134599fbb3944caa301aee1315caf1b7
                                                                                          • Opcode Fuzzy Hash: b7f0382918bdbae068f7aff175de01963f899d42ffafcc9a81e5a594352018fa
                                                                                          • Instruction Fuzzy Hash: C151E5B2B00156BFDB50DF989D9097FF7B9FB082047548169E5A5D7641E239FF008BA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                          • API String ID: 48624451-2108815105
                                                                                          • Opcode ID: d61f77356ec81dc121738cee6f87a90509c5e1fc1e5ab803b4cb84eb8a472a04
                                                                                          • Instruction ID: b16d061662f3d28b8f52c579ec19e0c01e3fb4ebf0698d0960bf247ac2b59d40
                                                                                          • Opcode Fuzzy Hash: d61f77356ec81dc121738cee6f87a90509c5e1fc1e5ab803b4cb84eb8a472a04
                                                                                          • Instruction Fuzzy Hash: C051C775B00645AFDB30EE5CC89497FBBF9EB44304B4484AAE8D7D7681E674FA408760
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • Execute=1, xrefs: 04D24713
                                                                                          • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04D24655
                                                                                          • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04D24742
                                                                                          • CLIENT(ntdll): Processing section info %ws..., xrefs: 04D24787
                                                                                          • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 04D246FC
                                                                                          • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04D24725
                                                                                          • ExecuteOptions, xrefs: 04D246A0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                          • API String ID: 0-484625025
                                                                                          • Opcode ID: 594f8ae684fc250a0839353abb63639677041300252e701b79d995b4680015b6
                                                                                          • Instruction ID: c02b1f2cf1ef2539058ac6149e5dd098533d0355221c0d9fad65e9d2f2207a3b
                                                                                          • Opcode Fuzzy Hash: 594f8ae684fc250a0839353abb63639677041300252e701b79d995b4680015b6
                                                                                          • Instruction Fuzzy Hash: 05510B31A01219BBEF11EFA5DC59FBA77AEEF14708F0400A9D505AB190EB71BE458F50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: __aulldvrm
                                                                                          • String ID: +$-$0$0
                                                                                          • API String ID: 1302938615-699404926
                                                                                          • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                          • Instruction ID: 68e8917eaccddd257b02ef5fec262f3145b10b5332e905915ff21199a45864a4
                                                                                          • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                          • Instruction Fuzzy Hash: D381B370E456499EDF688E68CC517FEBBB3AF85350F18411ADA51A7290E73CBE40CB60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: %%%u$[$]:%u
                                                                                          • API String ID: 48624451-2819853543
                                                                                          • Opcode ID: b11307f5e43632df9b6fd6f0b255bbc66de9283ac4593008910e9c7e8b87fcc3
                                                                                          • Instruction ID: 35fcc40b921cbbd9cbb6f3981891259b6546364d4ca77d6f8710d1a3f008d897
                                                                                          • Opcode Fuzzy Hash: b11307f5e43632df9b6fd6f0b255bbc66de9283ac4593008910e9c7e8b87fcc3
                                                                                          • Instruction Fuzzy Hash: B0215E76E00119ABDB10EFA9DC50AEEBBF9FF54744F440166E906E3240E734EA019BA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RTL: Re-Waiting, xrefs: 04D2031E
                                                                                          • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 04D202E7
                                                                                          • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 04D202BD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                          • API String ID: 0-2474120054
                                                                                          • Opcode ID: 6890b1410f2eeabd3abb6a38d23b5ab05a8cff079533c28309270772eb85cc3a
                                                                                          • Instruction ID: 6cd8dac13bfccd3f256b96920c68c5a991c5ecbad0e929bf48966898e9a0d466
                                                                                          • Opcode Fuzzy Hash: 6890b1410f2eeabd3abb6a38d23b5ab05a8cff079533c28309270772eb85cc3a
                                                                                          • Instruction Fuzzy Hash: A0E1C0306047419FD725CF28C984B6AB7E2BF89318F140A6DF6968B2E0E774F945CB52
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          • RTL: Resource at %p, xrefs: 04D27B8E
                                                                                          • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 04D27B7F
                                                                                          • RTL: Re-Waiting, xrefs: 04D27BAC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                          • API String ID: 0-871070163
                                                                                          • Opcode ID: 8f897e22bbe7a788e277463b9b2bc699452c2d06081267f338e8c495750076ac
                                                                                          • Instruction ID: 7b31cc69c0dbcd525efcad20a629b01e3b9596bf99a99bb2b8c24cbcef2f1d2c
                                                                                          • Opcode Fuzzy Hash: 8f897e22bbe7a788e277463b9b2bc699452c2d06081267f338e8c495750076ac
                                                                                          • Instruction Fuzzy Hash: 6141E1357017029FDB24DE26C940B7AB7E6EF88715F100A2DF95ADB680EB31F9058B91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04D2728C
                                                                                          Strings
                                                                                          • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 04D27294
                                                                                          • RTL: Resource at %p, xrefs: 04D272A3
                                                                                          • RTL: Re-Waiting, xrefs: 04D272C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                          • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                          • API String ID: 885266447-605551621
                                                                                          • Opcode ID: b9e7afbf0de9699574f3da7aac93a69e16861f08096deab8793f3658b76d6f34
                                                                                          • Instruction ID: 361b804ebfb236c891a74e3f7e59b2c439d7cccf6c0bb874f13b2cb482606969
                                                                                          • Opcode Fuzzy Hash: b9e7afbf0de9699574f3da7aac93a69e16861f08096deab8793f3658b76d6f34
                                                                                          • Instruction Fuzzy Hash: 26411031700216ABD721DE26CD41B76B7A6FF94718F140619F955EB240EB31F8528BE0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___swprintf_l
                                                                                          • String ID: %%%u$]:%u
                                                                                          • API String ID: 48624451-3050659472
                                                                                          • Opcode ID: 7b8d8c6a6ac7e0840d7c0908729ff7c720d8959f6cacf1a4c9a3ab313f115ae8
                                                                                          • Instruction ID: 99bf44b10d5b47880d39e3feb6a7cccaaf4ef775b74f4d3689cb168f6a49fc2f
                                                                                          • Opcode Fuzzy Hash: 7b8d8c6a6ac7e0840d7c0908729ff7c720d8959f6cacf1a4c9a3ab313f115ae8
                                                                                          • Instruction Fuzzy Hash: 4E318472A002199FDF20EE2CDC40BEE77B8FB44714F44459AE849E3240EB30FA548BA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: __aulldvrm
                                                                                          • String ID: +$-
                                                                                          • API String ID: 1302938615-2137968064
                                                                                          • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                          • Instruction ID: d48d07ec43f471946687602c982f9e7530035692ea144806b130697ce690ec96
                                                                                          • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                          • Instruction Fuzzy Hash: 0E91A570E012169FDFA4DF69CC81ABEB7A7EF44320F54451AEA55E72C0E738AA418760
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $$@
                                                                                          • API String ID: 0-1194432280
                                                                                          • Opcode ID: 6bebc1e08cf63b47d8a3d72a6b18f7f1bb58afba14abba2b863a9439a7966b07
                                                                                          • Instruction ID: c7d098e7c79b934672d80e24191ec04ad6cf5d47659718b078caf8eb044180d8
                                                                                          • Opcode Fuzzy Hash: 6bebc1e08cf63b47d8a3d72a6b18f7f1bb58afba14abba2b863a9439a7966b07
                                                                                          • Instruction Fuzzy Hash: D1812CB5D002699BDB31CB54CC44BEEB7B5AF08714F0041DAEA19B7290E731AE84DFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 04D3CFBD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.3885268113.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C80000, based on PE: true
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.3885268113.0000000004E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_4c80000_systray.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallFilterFunc@8
                                                                                          • String ID: @$@4Qw@4Qw
                                                                                          • API String ID: 4062629308-2383119779
                                                                                          • Opcode ID: 0640d6ce9bfe71d433ef1014b0dddccf6c5d4a114edca1d333d345a73055650d
                                                                                          • Instruction ID: 2d90f424f8c205c9a200b99d603f1afe4a5b8f0845e958b60204de5e427aa5b2
                                                                                          • Opcode Fuzzy Hash: 0640d6ce9bfe71d433ef1014b0dddccf6c5d4a114edca1d333d345a73055650d
                                                                                          • Instruction Fuzzy Hash: 7741AD72E00224DFDB21DFA5D840AAEBBBAFF44B04F00402AE955EB260D774E805DF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%