Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Overdue_payment.pdf.exe

Overview

General Information

Sample name:Overdue_payment.pdf.exe
Analysis ID:1570483
MD5:8b57457c486a24230c0fcc907ee84062
SHA1:aab3ba33f51878f115eb64f3d3adf3ce90f306fb
SHA256:c6ca7a0c812b140b8d3e1f7ceb12f0efe6bc0f564c6312814bc9dba1255e8788
Tags:AgentTeslaexePaymentuser-cocaman
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Overdue_payment.pdf.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\Overdue_payment.pdf.exe" MD5: 8B57457C486A24230C0FCC907EE84062)
    • powershell.exe (PID: 7712 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7752 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8132 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7796 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Overdue_payment.pdf.exe (PID: 7984 cmdline: "C:\Users\user\Desktop\Overdue_payment.pdf.exe" MD5: 8B57457C486A24230C0FCC907EE84062)
    • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • lxZwKFTCWa.exe (PID: 8092 cmdline: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe MD5: 8B57457C486A24230C0FCC907EE84062)
    • schtasks.exe (PID: 2044 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lxZwKFTCWa.exe (PID: 3584 cmdline: "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe" MD5: 8B57457C486A24230C0FCC907EE84062)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.2921935892.0000000000437000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Overdue_payment.pdf.exe.4339970.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Overdue_payment.pdf.exe.4339970.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Overdue_payment.pdf.exe.4339970.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316ef:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31761:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317eb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3187d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318e7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31959:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319ef:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a7f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Overdue_payment.pdf.exe.4374390.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.Overdue_payment.pdf.exe.4374390.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 9 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Overdue_payment.pdf.exe, NewProcessName: C:\Users\user\Desktop\Overdue_payment.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ProcessId: 7560, ProcessName: Overdue_payment.pdf.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ParentImage: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentProcessId: 7560, ParentProcessName: Overdue_payment.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ProcessId: 7712, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ParentImage: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentProcessId: 7560, ParentProcessName: Overdue_payment.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ProcessId: 7712, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe, ParentImage: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe, ParentProcessId: 8092, ParentProcessName: lxZwKFTCWa.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp", ProcessId: 2044, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\Overdue_payment.pdf.exe, Initiated: true, ProcessId: 7984, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ParentImage: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentProcessId: 7560, ParentProcessName: Overdue_payment.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", ProcessId: 7796, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ParentImage: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentProcessId: 7560, ParentProcessName: Overdue_payment.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ProcessId: 7712, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Overdue_payment.pdf.exe", ParentImage: C:\Users\user\Desktop\Overdue_payment.pdf.exe, ParentProcessId: 7560, ParentProcessName: Overdue_payment.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp", ProcessId: 7796, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Overdue_payment.pdf.exeAvira: detected
                    Source: http://mail.iaa-airferight.comAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeAvira: detection malicious, Label: HEUR/AGEN.1305646
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeReversingLabs: Detection: 63%
                    Source: Overdue_payment.pdf.exeReversingLabs: Detection: 63%
                    Source: Overdue_payment.pdf.exeVirustotal: Detection: 63%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeJoe Sandbox ML: detected
                    Source: Overdue_payment.pdf.exeJoe Sandbox ML: detected
                    Source: Overdue_payment.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49736 version: TLS 1.2
                    Source: Overdue_payment.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49735 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: Overdue_payment.pdf.exe, lxZwKFTCWa.exe.0.drString found in binary or memory: http://localhost/calculator_server/requests.php
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1701347692.0000000003367000.00000004.00000800.00020000.00000000.sdmp, Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 00000009.00000002.1747105184.0000000002507000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2921923646.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2921923646.0000000000434000.00000040.00000400.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49736 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, abAX9N.cs.Net Code: OPnJT
                    Source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, abAX9N.cs.Net Code: OPnJT

                    System Summary

                    barindex
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Overdue_payment.pdf.exe.4374390.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Overdue_payment.pdf.exe
                    Source: initial sampleStatic PE information: Filename: Overdue_payment.pdf.exe
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_03183E280_2_03183E28
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_03186F900_2_03186F90
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_0318DFB40_2_0318DFB4
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E496980_2_05E49698
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E446210_2_05E44621
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E446300_2_05E44630
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E441F30_2_05E441F3
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E441F80_2_05E441F8
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E461A80_2_05E461A8
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E461970_2_05E46197
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E4C0280_2_05E4C028
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E43DC00_2_05E43DC0
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E43D8B0_2_05E43D8B
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E458D00_2_05E458D0
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030FE6A18_2_030FE6A1
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030F4A988_2_030F4A98
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030F3E808_2_030F3E80
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030F41C88_2_030F41C8
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030FA9608_2_030FA960
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E565E08_2_06E565E0
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E555888_2_06E55588
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E57D688_2_06E57D68
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E5B20F8_2_06E5B20F
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E530408_2_06E53040
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E576888_2_06E57688
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E55CD38_2_06E55CD3
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E5E3888_2_06E5E388
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E523498_2_06E52349
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E500408_2_06E50040
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_06E500068_2_06E50006
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_00963E289_2_00963E28
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_00966F909_2_00966F90
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_0096DFB49_2_0096DFB4
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_04AC44009_2_04AC4400
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_04AC52C89_2_04AC52C8
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_04AC27689_2_04AC2768
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_04AC27579_2_04AC2757
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C985709_2_06C98570
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C946219_2_06C94621
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C946309_2_06C94630
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C93DC09_2_06C93DC0
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C93DB29_2_06C93DB2
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C958D09_2_06C958D0
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C941F89_2_06C941F8
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C941F29_2_06C941F2
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C961979_2_06C96197
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C961A89_2_06C961A8
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016DA19813_2_016DA198
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016DE6A113_2_016DE6A1
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016DA96013_2_016DA960
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016D4A9813_2_016D4A98
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016D3E8013_2_016D3E80
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_016D41C813_2_016D41C8
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D37D6813_2_06D37D68
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3B21B13_2_06D3B21B
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3304013_2_06D33040
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3768813_2_06D37688
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3E38813_2_06D3E388
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3004013_2_06D30040
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D3000713_2_06D30007
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1701347692.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000000.1667376530.000000000100C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesfqwa.exe( vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1708572841.0000000005C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1701347692.000000000337C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1712623031.0000000007E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000000.00000002.1699679388.000000000146E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2921935892.0000000000437000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2922403149.00000000012F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exeBinary or memory string: OriginalFilenamesfqwa.exe( vs Overdue_payment.pdf.exe
                    Source: Overdue_payment.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Overdue_payment.pdf.exe.4374390.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Overdue_payment.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: lxZwKFTCWa.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SnUA4OO8RjvSkuR9Kc.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, Y97VjrhD8t1GlEnXo0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, Y97VjrhD8t1GlEnXo0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/15@2/2
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5472:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7768:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7856:120:WilError_03
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE707.tmpJump to behavior
                    Source: Overdue_payment.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Overdue_payment.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Overdue_payment.pdf.exeReversingLabs: Detection: 63%
                    Source: Overdue_payment.pdf.exeVirustotal: Detection: 63%
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile read: C:\Users\user\Desktop\Overdue_payment.pdf.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Overdue_payment.pdf.exe "C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Users\user\Desktop\Overdue_payment.pdf.exe "C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Users\user\Desktop\Overdue_payment.pdf.exe "C:\Users\user\Desktop\Overdue_payment.pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Overdue_payment.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Overdue_payment.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SnUA4OO8RjvSkuR9Kc.cs.Net Code: w7xjBnBbgd System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Overdue_payment.pdf.exe.5c90000.3.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SnUA4OO8RjvSkuR9Kc.cs.Net Code: w7xjBnBbgd System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_03185E00 push eax; iretd 0_2_03185E09
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E43606 push cs; retf 0_2_05E4360F
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 0_2_05E4B95B push ecx; retf 0_2_05E4B966
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeCode function: 8_2_030F0C55 push edi; retf 8_2_030F0C7A
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_00965E00 push eax; iretd 9_2_00965E09
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C9B295 push FFFFFF8Bh; iretd 9_2_06C9B297
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 9_2_06C91803 push es; retf 9_2_06C91818
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D387CB push esi; retf 13_2_06D387CE
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D36CF7 pushfd ; retf 13_2_06D36CF9
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D36583 push eax; retf 13_2_06D36589
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D39A69 push 671C06CBh; retf 13_2_06D39A6E
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D383B3 push ebx; retf 13_2_06D383BA
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D383B0 push esp; retf 13_2_06D383B2
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D34071 push cs; retf 13_2_06D34072
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeCode function: 13_2_06D33037 push es; retf 13_2_06D3303A
                    Source: Overdue_payment.pdf.exeStatic PE information: section name: .text entropy: 7.78729195951309
                    Source: lxZwKFTCWa.exe.0.drStatic PE information: section name: .text entropy: 7.78729195951309
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SI2DFygjyHMCPQXuXN.csHigh entropy of concatenated method names: 'BZkHyYdiBX', 'xxDHXfwwwO', 'GbJHN175F1', 'NINHdYa5OB', 'L5IHOfJ5HQ', 'UEhNTjf6i4', 'v9ANooakAn', 'scUN50V0VY', 'V1eNUwyBYA', 'gxwNpwBsmg'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, YD81QN9glp4BWl8Zeu.csHigh entropy of concatenated method names: 'aeMNE406Fc', 'IBiNQF8YM7', 'nRof3l2Boa', 'ay2fDxdHoI', 'bqAfuCWx22', 'SY7f0nnlHr', 'CEiflMsrph', 'Nrmf1NQr5N', 'vn9fIM3rEd', 'NI1fw81LoZ'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, QwIDEjzupR4yxjxB8C.csHigh entropy of concatenated method names: 'odDRGeTtHk', 'fsMRh0wd3r', 'nadR2Nmrkp', 'K5dRgEj9kt', 'ce9R4JW2KC', 'x6fRDTxlF8', 'JAyRusIGUY', 'wc8RmXMLlm', 'zucRs8saXG', 'TcqRt9KZTg'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, q8kJvY5YJVWrxrrera.csHigh entropy of concatenated method names: 'Pi4nKSU9oo', 'JZHnJgs7FS', 'u6pnnmjLyj', 'U6NnZyfikF', 'VI0n85136s', 'AoJnmhqNsm', 'Dispose', 'SFvYMpKBpV', 'UnPYXlWaKs', 'AVVYflaBvS'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, lOHdDllsuqB6g5ksId.csHigh entropy of concatenated method names: 'iuXdMbKPGx', 'oNsdfqXWC6', 'fLTdHgEXqN', 'MxNHexEgfn', 'TIGHzVy5UJ', 'bX0dVkN6ja', 'vCKdPoxQes', 'bDmdF4v8q9', 'N7XdcmTowL', 'gFkdjiuoXO'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, iZKRe0PV56BCRlBiq0i.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DgGR7ZALE8', 'EYMRvZIUKF', 'oETRApfICN', 'xg4Rk8iMnJ', 'gm1R6Ddw8Y', 'vNnRaE9fXr', 'ujjRqBU34W'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, uPq8ZRPci2UCQ7nudbe.csHigh entropy of concatenated method names: 'dnMZedxS06', 'f3yZz06yS8', 'fqkSVgmtWm', 'finL9aP3uwBD5LLfe7r', 'AGuQpTPJ8BermwMyN4I', 'HAYvExPfhM5YcB0M1mM', 'C0f5tXPXful4ERfElUp'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SIC72jIVFQ79FV8Kht.csHigh entropy of concatenated method names: 'ScQdsp4ZnE', 'l4MdtiC1g6', 'VjtdBqZRqY', 'jWGdWeHpb4', 'SvjdEjTgMA', 'lNsdGn5Uee', 'YijdQkrKWT', 'BO4dhITOc0', 'Qrfd2IEcKu', 'Mn1d9fRJn2'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, uC0yAWAaaOKLfG1SJY.csHigh entropy of concatenated method names: 'cQubhvgvgq', 'FNLb27A5k6', 'XPfbg4EhpR', 'Mw2b4Fsmxr', 'j0rbDHCRHH', 'qWybu1lQOy', 'WDhblgJrjd', 'DXOb1Torf4', 'rWbbw815xp', 'UOUb7dSLPU'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, a6qh9vF22iW84Yx3oH.csHigh entropy of concatenated method names: 'uLCBmGXnc', 'i2JWePVK5', 'cxvGhPD3m', 'bsLQqLqUB', 'EYc2V0uoA', 'XTx95VOui', 'xl1iq7t841OlRuQetv', 'UQNe7OEcY2qCaqESVQ', 'FkMYfOmFp', 'vhuR6RXHQ'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, SnUA4OO8RjvSkuR9Kc.csHigh entropy of concatenated method names: 'yWYcyN3lkh', 'I04cMnWj6i', 'ycZcXdWlwX', 'gagcf8Qqui', 'LaxcNFMWDN', 'QfrcHKwhN0', 'SbZcdJWN3m', 'rNYcO8B9jC', 'h1wcCPXd1d', 'FZqcipKiXf'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, bPacPBqV3gGyBTCC30.csHigh entropy of concatenated method names: 'yTkJiEkYWC', 'bHTJLynV44', 'ToString', 'N6rJMNKU3D', 'T5cJX1yyRY', 'cRDJfnD6Aq', 'kncJN978nM', 'aAUJHDJTRe', 'gxCJdMW1X1', 'DYIJORTBET'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, cFYdLZ2Me1w6vd722T.csHigh entropy of concatenated method names: 'vy5fWOnIaP', 'OsSfGUwyGX', 'lwgfhbAJFA', 'NDVf2UG2UH', 'qJgfKqnN1C', 'tKCfr3IJG1', 'E9bfJjuh1C', 'FMUfYMK1qN', 'mVIfnhI01D', 'UEQfRyps1X'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, uMvELCaeUrFbwtMips.csHigh entropy of concatenated method names: 'ToString', 'BMbr7osRJB', 'BTvr41b48q', 'gQyr3o8QGf', 'Ia0rDk1pNg', 'r9jruottxS', 'P1Mr0lFpcU', 'qkdrlsiMn6', 'mXpr1ykpWx', 'SqLrIjmCLA'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, rB6QMLkARr8RuOcGbS.csHigh entropy of concatenated method names: 'yCYKwcchAU', 'smJKvUvMgC', 'oneKk2qLnf', 'GnYK6gSBAu', 'mG9K4BG4BR', 'J3KK3XEDqv', 'eyOKDWvIY1', 'OobKuTiEPB', 'ayiK05IHNM', 'CxQKlskYnO'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, b2Peb34QfCYkKXMqTd.csHigh entropy of concatenated method names: 'PoJFskhIBBUTCu0XYBi', 'fSmevnh1aS9Y1RQMjin', 'wyOHYFOpEh', 'YeEHnLA45X', 'eQ7HRciIrt', 'B3VdVchBaG1p7JaVqE8', 'mdspmQhvosvbdxSbfJ7'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, OZLqOfjF6KdTvse1vC.csHigh entropy of concatenated method names: 'dkePd97Vjr', 'I8tPO1GlEn', 'tMePi1w6vd', 'O22PLTeD81', 'L8ZPKeu6I2', 'IFyPrjyHMC', 'RGGt7NZIK7kejM33Ra', 'Yop4gqJQ85HaIE2oaT', 'fXsPPqoPIk', 'BNdPcZDdal'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, L9kjtgfwltBpqZpTSB.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Tc9FpF4L07', 'b6wFewHTRK', 'wPYFzLXHbv', 'wElcVI3YfS', 'LeVcPHbpyy', 'U3VcF54FhF', 'maGccLgYsM', 'v6dbQmssTUSuPmMbVGl'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, CRZFArokZ0SthcHgRC.csHigh entropy of concatenated method names: 'QOlJU8XcCK', 'fMkJeMcLgn', 'FI2YVVGA9i', 'XQkYPHkqRJ', 'rT0J7EjxgU', 'Yl0Jv4eQkF', 'WrZJA2OONj', 'zVEJk1aHH0', 'Il9J6np021', 'SrpJayMq0W'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, Y97VjrhD8t1GlEnXo0.csHigh entropy of concatenated method names: 'cmvXkorfyE', 'sFSX6mEy2E', 'jufXaL2l7M', 'n5gXqBHQH5', 'QpvXTUWkvp', 'DGXXoPuRIi', 'sgpX5xWdqA', 'Sb4XUe9Rk2', 'nREXpSbsmR', 'fcZXeUIS0d'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, NWigWqe4XCyLQCwHR5.csHigh entropy of concatenated method names: 'XejRfGl1IN', 'rvPRNDVPDP', 'O14RHvofAP', 'pOERdog78J', 'eJARnXXSGE', 'pnuROQvoiG', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, Mbm8MjpJLgPRwVOqj7.csHigh entropy of concatenated method names: 'eKgng6umms', 'WtCn4vguqc', 'aJCn3Kty0F', 'OnHnDJIjM8', 'TxRnuqJ3TK', 'gqnn0YMoGY', 'R4lnlElypp', 'kQ9n1k1T6i', 'VNvnITosw8', 'Q2ynwo6tjr'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, zgICFdPPw5PCGx8wx3W.csHigh entropy of concatenated method names: 'ha1ReJHTml', 'vn2RzyxEid', 'YYTZVE6l3u', 'VL0ZPKbusD', 'Jg3ZFLl2xo', 'p0PZcLaf78', 'OsWZjGGkRI', 'm3xZyUgUMa', 'D8OZMbkOdh', 'Y1BZXWsDTR'
                    Source: 0.2.Overdue_payment.pdf.exe.4581918.2.raw.unpack, qJhEq6Xdyhgxkaf6IP.csHigh entropy of concatenated method names: 'Dispose', 'aWrPpxrrer', 'wY9F4jileT', 'itAGNhMlMW', 'SEkPesSeCl', 'FEbPzmGcny', 'ProcessDialogKey', 'mcIFVbm8Mj', 'pLgFPPRwVO', 'Tj7FFwWigW'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SI2DFygjyHMCPQXuXN.csHigh entropy of concatenated method names: 'BZkHyYdiBX', 'xxDHXfwwwO', 'GbJHN175F1', 'NINHdYa5OB', 'L5IHOfJ5HQ', 'UEhNTjf6i4', 'v9ANooakAn', 'scUN50V0VY', 'V1eNUwyBYA', 'gxwNpwBsmg'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, YD81QN9glp4BWl8Zeu.csHigh entropy of concatenated method names: 'aeMNE406Fc', 'IBiNQF8YM7', 'nRof3l2Boa', 'ay2fDxdHoI', 'bqAfuCWx22', 'SY7f0nnlHr', 'CEiflMsrph', 'Nrmf1NQr5N', 'vn9fIM3rEd', 'NI1fw81LoZ'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, QwIDEjzupR4yxjxB8C.csHigh entropy of concatenated method names: 'odDRGeTtHk', 'fsMRh0wd3r', 'nadR2Nmrkp', 'K5dRgEj9kt', 'ce9R4JW2KC', 'x6fRDTxlF8', 'JAyRusIGUY', 'wc8RmXMLlm', 'zucRs8saXG', 'TcqRt9KZTg'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, q8kJvY5YJVWrxrrera.csHigh entropy of concatenated method names: 'Pi4nKSU9oo', 'JZHnJgs7FS', 'u6pnnmjLyj', 'U6NnZyfikF', 'VI0n85136s', 'AoJnmhqNsm', 'Dispose', 'SFvYMpKBpV', 'UnPYXlWaKs', 'AVVYflaBvS'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, lOHdDllsuqB6g5ksId.csHigh entropy of concatenated method names: 'iuXdMbKPGx', 'oNsdfqXWC6', 'fLTdHgEXqN', 'MxNHexEgfn', 'TIGHzVy5UJ', 'bX0dVkN6ja', 'vCKdPoxQes', 'bDmdF4v8q9', 'N7XdcmTowL', 'gFkdjiuoXO'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, iZKRe0PV56BCRlBiq0i.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DgGR7ZALE8', 'EYMRvZIUKF', 'oETRApfICN', 'xg4Rk8iMnJ', 'gm1R6Ddw8Y', 'vNnRaE9fXr', 'ujjRqBU34W'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, uPq8ZRPci2UCQ7nudbe.csHigh entropy of concatenated method names: 'dnMZedxS06', 'f3yZz06yS8', 'fqkSVgmtWm', 'finL9aP3uwBD5LLfe7r', 'AGuQpTPJ8BermwMyN4I', 'HAYvExPfhM5YcB0M1mM', 'C0f5tXPXful4ERfElUp'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SIC72jIVFQ79FV8Kht.csHigh entropy of concatenated method names: 'ScQdsp4ZnE', 'l4MdtiC1g6', 'VjtdBqZRqY', 'jWGdWeHpb4', 'SvjdEjTgMA', 'lNsdGn5Uee', 'YijdQkrKWT', 'BO4dhITOc0', 'Qrfd2IEcKu', 'Mn1d9fRJn2'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, uC0yAWAaaOKLfG1SJY.csHigh entropy of concatenated method names: 'cQubhvgvgq', 'FNLb27A5k6', 'XPfbg4EhpR', 'Mw2b4Fsmxr', 'j0rbDHCRHH', 'qWybu1lQOy', 'WDhblgJrjd', 'DXOb1Torf4', 'rWbbw815xp', 'UOUb7dSLPU'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, a6qh9vF22iW84Yx3oH.csHigh entropy of concatenated method names: 'uLCBmGXnc', 'i2JWePVK5', 'cxvGhPD3m', 'bsLQqLqUB', 'EYc2V0uoA', 'XTx95VOui', 'xl1iq7t841OlRuQetv', 'UQNe7OEcY2qCaqESVQ', 'FkMYfOmFp', 'vhuR6RXHQ'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, SnUA4OO8RjvSkuR9Kc.csHigh entropy of concatenated method names: 'yWYcyN3lkh', 'I04cMnWj6i', 'ycZcXdWlwX', 'gagcf8Qqui', 'LaxcNFMWDN', 'QfrcHKwhN0', 'SbZcdJWN3m', 'rNYcO8B9jC', 'h1wcCPXd1d', 'FZqcipKiXf'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, bPacPBqV3gGyBTCC30.csHigh entropy of concatenated method names: 'yTkJiEkYWC', 'bHTJLynV44', 'ToString', 'N6rJMNKU3D', 'T5cJX1yyRY', 'cRDJfnD6Aq', 'kncJN978nM', 'aAUJHDJTRe', 'gxCJdMW1X1', 'DYIJORTBET'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, cFYdLZ2Me1w6vd722T.csHigh entropy of concatenated method names: 'vy5fWOnIaP', 'OsSfGUwyGX', 'lwgfhbAJFA', 'NDVf2UG2UH', 'qJgfKqnN1C', 'tKCfr3IJG1', 'E9bfJjuh1C', 'FMUfYMK1qN', 'mVIfnhI01D', 'UEQfRyps1X'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, uMvELCaeUrFbwtMips.csHigh entropy of concatenated method names: 'ToString', 'BMbr7osRJB', 'BTvr41b48q', 'gQyr3o8QGf', 'Ia0rDk1pNg', 'r9jruottxS', 'P1Mr0lFpcU', 'qkdrlsiMn6', 'mXpr1ykpWx', 'SqLrIjmCLA'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, rB6QMLkARr8RuOcGbS.csHigh entropy of concatenated method names: 'yCYKwcchAU', 'smJKvUvMgC', 'oneKk2qLnf', 'GnYK6gSBAu', 'mG9K4BG4BR', 'J3KK3XEDqv', 'eyOKDWvIY1', 'OobKuTiEPB', 'ayiK05IHNM', 'CxQKlskYnO'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, b2Peb34QfCYkKXMqTd.csHigh entropy of concatenated method names: 'PoJFskhIBBUTCu0XYBi', 'fSmevnh1aS9Y1RQMjin', 'wyOHYFOpEh', 'YeEHnLA45X', 'eQ7HRciIrt', 'B3VdVchBaG1p7JaVqE8', 'mdspmQhvosvbdxSbfJ7'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, OZLqOfjF6KdTvse1vC.csHigh entropy of concatenated method names: 'dkePd97Vjr', 'I8tPO1GlEn', 'tMePi1w6vd', 'O22PLTeD81', 'L8ZPKeu6I2', 'IFyPrjyHMC', 'RGGt7NZIK7kejM33Ra', 'Yop4gqJQ85HaIE2oaT', 'fXsPPqoPIk', 'BNdPcZDdal'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, L9kjtgfwltBpqZpTSB.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Tc9FpF4L07', 'b6wFewHTRK', 'wPYFzLXHbv', 'wElcVI3YfS', 'LeVcPHbpyy', 'U3VcF54FhF', 'maGccLgYsM', 'v6dbQmssTUSuPmMbVGl'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, CRZFArokZ0SthcHgRC.csHigh entropy of concatenated method names: 'QOlJU8XcCK', 'fMkJeMcLgn', 'FI2YVVGA9i', 'XQkYPHkqRJ', 'rT0J7EjxgU', 'Yl0Jv4eQkF', 'WrZJA2OONj', 'zVEJk1aHH0', 'Il9J6np021', 'SrpJayMq0W'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, Y97VjrhD8t1GlEnXo0.csHigh entropy of concatenated method names: 'cmvXkorfyE', 'sFSX6mEy2E', 'jufXaL2l7M', 'n5gXqBHQH5', 'QpvXTUWkvp', 'DGXXoPuRIi', 'sgpX5xWdqA', 'Sb4XUe9Rk2', 'nREXpSbsmR', 'fcZXeUIS0d'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, NWigWqe4XCyLQCwHR5.csHigh entropy of concatenated method names: 'XejRfGl1IN', 'rvPRNDVPDP', 'O14RHvofAP', 'pOERdog78J', 'eJARnXXSGE', 'pnuROQvoiG', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, Mbm8MjpJLgPRwVOqj7.csHigh entropy of concatenated method names: 'eKgng6umms', 'WtCn4vguqc', 'aJCn3Kty0F', 'OnHnDJIjM8', 'TxRnuqJ3TK', 'gqnn0YMoGY', 'R4lnlElypp', 'kQ9n1k1T6i', 'VNvnITosw8', 'Q2ynwo6tjr'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, zgICFdPPw5PCGx8wx3W.csHigh entropy of concatenated method names: 'ha1ReJHTml', 'vn2RzyxEid', 'YYTZVE6l3u', 'VL0ZPKbusD', 'Jg3ZFLl2xo', 'p0PZcLaf78', 'OsWZjGGkRI', 'm3xZyUgUMa', 'D8OZMbkOdh', 'Y1BZXWsDTR'
                    Source: 0.2.Overdue_payment.pdf.exe.7e90000.4.raw.unpack, qJhEq6Xdyhgxkaf6IP.csHigh entropy of concatenated method names: 'Dispose', 'aWrPpxrrer', 'wY9F4jileT', 'itAGNhMlMW', 'SEkPesSeCl', 'FEbPzmGcny', 'ProcessDialogKey', 'mcIFVbm8Mj', 'pLgFPPRwVO', 'Tj7FFwWigW'
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: Possible double extension: pdf.exeStatic PE information: Overdue_payment.pdf.exe
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lxZwKFTCWa.exe PID: 8092, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 5330000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 8340000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 7F10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 9340000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: A340000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: 5110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 2230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 6ED0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 6CA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 7ED0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 8ED0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 16D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 30C0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory allocated: 3010000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5124Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5123Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWindow / User API: threadDelayed 3353Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWindow / User API: threadDelayed 6487Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWindow / User API: threadDelayed 3080
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWindow / User API: threadDelayed 6768
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 7580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8048Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8072Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 6100Thread sleep count: 3353 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 6100Thread sleep count: 6487 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -99109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98998s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98650s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -98094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -97109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96998s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96662s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96543s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96306s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -96113s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -95000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exe TID: 736Thread sleep time: -94015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7344Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep count: 36 > 30
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -33204139332677172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7728Thread sleep count: 3080 > 30
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7728Thread sleep count: 6768 > 30
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -99000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98234s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -98125s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97999s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97886s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97779s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97619s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97390s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -97062s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96946s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96718s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96609s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96390s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96256s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96125s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -96015s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95903s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95551s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95435s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -95093s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe TID: 7684Thread sleep time: -94437s >= -30000s
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98998Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98650Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98312Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 98094Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97984Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97875Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97765Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97656Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97328Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97219Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 97109Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96998Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96890Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96781Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96662Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96543Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96422Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96306Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 96113Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95890Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95765Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95656Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95547Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95437Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95328Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95218Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95109Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 95000Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94890Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94781Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94671Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94562Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94453Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94343Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94234Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94125Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeThread delayed: delay time: 94015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99765
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99547
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99437
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99328
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99219
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99109
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 99000
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98890
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98781
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98672
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98562
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98453
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98343
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98234
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 98125
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97999
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97886
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97779
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97619
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97500
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97390
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97281
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97172
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 97062
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96946
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96828
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96718
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96609
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96500
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96390
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96256
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96125
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 96015
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95903
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95781
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95672
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95551
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95435
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95312
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95203
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 95093
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94984
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94874
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94765
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94656
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94546
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeThread delayed: delay time: 94437
                    Source: Overdue_payment.pdf.exe, 00000008.00000002.2922443177.0000000001424000.00000004.00000020.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2923066733.000000000124C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeMemory written: C:\Users\user\Desktop\Overdue_payment.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeMemory written: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeProcess created: C:\Users\user\Desktop\Overdue_payment.pdf.exe "C:\Users\user\Desktop\Overdue_payment.pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeProcess created: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Users\user\Desktop\Overdue_payment.pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Users\user\Desktop\Overdue_payment.pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2924376816.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lxZwKFTCWa.exe PID: 3584, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Overdue_payment.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2921935892.0000000000437000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2924376816.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lxZwKFTCWa.exe PID: 3584, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4374390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Overdue_payment.pdf.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2924376816.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Overdue_payment.pdf.exe PID: 7984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lxZwKFTCWa.exe PID: 3584, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    12
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS221
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570483 Sample: Overdue_payment.pdf.exe Startdate: 07/12/2024 Architecture: WINDOWS Score: 100 46 mail.iaa-airferight.com 2->46 48 api.ipify.org 2->48 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 14 other signatures 2->60 8 Overdue_payment.pdf.exe 7 2->8         started        12 lxZwKFTCWa.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\lxZwKFTCWa.exe, PE32 8->38 dropped 40 C:\Users\...\lxZwKFTCWa.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmpE707.tmp, XML 8->42 dropped 44 C:\Users\user\...\Overdue_payment.pdf.exe.log, ASCII 8->44 dropped 62 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->62 64 Uses schtasks.exe or at.exe to add and modify task schedules 8->64 66 Adds a directory exclusion to Windows Defender 8->66 68 Injects a PE file into a foreign processes 8->68 14 Overdue_payment.pdf.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        26 2 other processes 8->26 70 Antivirus detection for dropped file 12->70 72 Multi AV Scanner detection for dropped file 12->72 74 Machine Learning detection for dropped file 12->74 22 lxZwKFTCWa.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 50 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->50 52 api.ipify.org 172.67.74.152, 443, 49733, 49736 CLOUDFLARENETUS United States 14->52 76 Loading BitLocker PowerShell Module 18->76 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        78 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->78 80 Tries to steal Mail credentials (via file / registry access) 22->80 82 Tries to harvest and steal ftp login credentials 22->82 84 Tries to harvest and steal browser information (history, passwords, etc) 22->84 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Overdue_payment.pdf.exe63%ReversingLabsByteCode-MSIL.Backdoor.FormBook
                    Overdue_payment.pdf.exe63%VirustotalBrowse
                    Overdue_payment.pdf.exe100%AviraHEUR/AGEN.1305646
                    Overdue_payment.pdf.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe100%AviraHEUR/AGEN.1305646
                    C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe63%ReversingLabsByteCode-MSIL.Backdoor.FormBook
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.iaa-airferight.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truetrue
                      unknown
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/?Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://account.dyn.com/Overdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2921923646.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers?Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://mail.iaa-airferight.comOverdue_payment.pdf.exe, 00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.tiro.comOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designersOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.goodfont.co.krOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.ipify.org/tOverdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.carterandcone.comlOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sajatypeworks.comOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.typography.netDOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/cabarga.htmlNOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cn/cTheOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.galapagosdesign.com/staff/dennis.htmOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://api.ipify.orgOverdue_payment.pdf.exe, 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2921923646.0000000000434000.00000040.00000400.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.founder.com.cn/cnOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.fontbureau.com/designers/frere-user.htmlOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://localhost/calculator_server/requests.phpOverdue_payment.pdf.exe, lxZwKFTCWa.exe.0.drfalse
                                                                    high
                                                                    http://www.jiyu-kobo.co.jp/Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.galapagosdesign.com/DPleaseOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.fontbureau.com/designers8Overdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.fonts.comOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.sandoll.co.krOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.urwpp.deDPleaseOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.zhongyicts.com.cnOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOverdue_payment.pdf.exe, 00000000.00000002.1701347692.0000000003367000.00000004.00000800.00020000.00000000.sdmp, Overdue_payment.pdf.exe, 00000008.00000002.2924377723.0000000003111000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 00000009.00000002.1747105184.0000000002507000.00000004.00000800.00020000.00000000.sdmp, lxZwKFTCWa.exe, 0000000D.00000002.2924376816.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.sakkal.comOverdue_payment.pdf.exe, 00000000.00000002.1711559625.0000000007702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      • No. of IPs < 25%
                                                                                      • 25% < No. of IPs < 50%
                                                                                      • 50% < No. of IPs < 75%
                                                                                      • 75% < No. of IPs
                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                      46.175.148.58
                                                                                      mail.iaa-airferight.comUkraine
                                                                                      56394ASLAGIDKOM-NETUAtrue
                                                                                      172.67.74.152
                                                                                      api.ipify.orgUnited States
                                                                                      13335CLOUDFLARENETUSfalse
                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                      Analysis ID:1570483
                                                                                      Start date and time:2024-12-07 05:32:06 +01:00
                                                                                      Joe Sandbox product:CloudBasic
                                                                                      Overall analysis duration:0h 6m 48s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:full
                                                                                      Cookbook file name:default.jbs
                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                      Number of analysed new started processes analysed:18
                                                                                      Number of new started drivers analysed:0
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:0
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Sample name:Overdue_payment.pdf.exe
                                                                                      Detection:MAL
                                                                                      Classification:mal100.troj.spyw.evad.winEXE@20/15@2/2
                                                                                      EGA Information:
                                                                                      • Successful, ratio: 100%
                                                                                      HCA Information:
                                                                                      • Successful, ratio: 100%
                                                                                      • Number of executed functions: 172
                                                                                      • Number of non-executed functions: 22
                                                                                      Cookbook Comments:
                                                                                      • Found application associated with file extension: .exe
                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                      TimeTypeDescription
                                                                                      04:33:00Task SchedulerRun new task: lxZwKFTCWa path: C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                      23:32:57API Interceptor188x Sleep call for process: Overdue_payment.pdf.exe modified
                                                                                      23:33:00API Interceptor37x Sleep call for process: powershell.exe modified
                                                                                      23:33:03API Interceptor185x Sleep call for process: lxZwKFTCWa.exe modified
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      46.175.148.58PO for fabric forecast.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                        980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                              RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                      2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                          172.67.74.152Simple1.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          Simple2.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                                                          • api.ipify.org/
                                                                                                          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.ipify.org/
                                                                                                          4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                                                                          • api.ipify.org/
                                                                                                          y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                                                                                          • api.ipify.org/
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          mail.iaa-airferight.comPO for fabric forecast.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                          • 46.175.148.58
                                                                                                          980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                          • 46.175.148.58
                                                                                                          RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          api.ipify.orgTECHNICAL SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 104.26.12.205
                                                                                                          Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 104.26.13.205
                                                                                                          980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 172.67.74.152
                                                                                                          y1rS62yprs.exeGet hashmaliciousBabadedaBrowse
                                                                                                          • 104.26.13.205
                                                                                                          apilibx64.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                          • 104.26.12.205
                                                                                                          xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                          • 104.26.12.205
                                                                                                          BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                          • 104.26.13.205
                                                                                                          lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                          • 104.26.13.205
                                                                                                          GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                          • 104.26.12.205
                                                                                                          8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                                                                                          • 104.26.12.205
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          ASLAGIDKOM-NETUAPO for fabric forecast.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                          • 46.175.148.58
                                                                                                          980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                          • 46.175.148.58
                                                                                                          RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                          • 46.175.148.58
                                                                                                          CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                          • 104.21.16.9
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 104.21.16.9
                                                                                                          https://m.frownpasture.top/xqbgOoR7LyCdyD4DEHLii/a8f4AAdjCXhECXlkXzJZXUg0VwwMXxcvBW8NcRstA0McXyNaQkY?_t=1733539511823#Get hashmaliciousUnknownBrowse
                                                                                                          • 172.67.216.178
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 104.21.16.9
                                                                                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                          • 172.67.165.166
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 172.67.165.166
                                                                                                          Fw 2025 Employee Handbook For all Colhca Employees Ref THEFUE.emlGet hashmaliciousUnknownBrowse
                                                                                                          • 162.159.61.3
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 104.21.16.9
                                                                                                          http://i777777o726f79616c627573696e65737362616e6b757361o636f6dz.oszar.comGet hashmaliciousUnknownBrowse
                                                                                                          • 172.67.11.155
                                                                                                          check.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 104.20.23.46
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 172.67.74.152
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 172.67.74.152
                                                                                                          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                          • 172.67.74.152
                                                                                                          TECHNICAL SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          • 172.67.74.152
                                                                                                          a9YMw44iQq.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                          • 172.67.74.152
                                                                                                          ozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                                                                          • 172.67.74.152
                                                                                                          https://www.google.ca/url?q=1120091333775300779273902563687390256368&rct=11200913337753007792&sa=t&url=amp/s/elanpro.net/horeca/dispenc#YnJ1bml0YS5kdW5jYW5AcGFydG5lcnNtZ3UuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                                                          • 172.67.74.152
                                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 172.67.74.152
                                                                                                          BGM LAW GROUP - RFP 2024.pdfGet hashmaliciousUnknownBrowse
                                                                                                          • 172.67.74.152
                                                                                                          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                          • 172.67.74.152
                                                                                                          No context
                                                                                                          Process:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1216
                                                                                                          Entropy (8bit):5.34331486778365
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                          Malicious:true
                                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                          Process:C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1216
                                                                                                          Entropy (8bit):5.34331486778365
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                          Malicious:false
                                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:data
                                                                                                          Category:modified
                                                                                                          Size (bytes):2232
                                                                                                          Entropy (8bit):5.380805901110357
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZPUyuVws:lGLHyIFKL3IZ2KRH9OugbVws
                                                                                                          MD5:18E30393FF7938228743359A706F90CE
                                                                                                          SHA1:D042841E7A99578FB7DF31A21111A90F31287D37
                                                                                                          SHA-256:818419579AF78103C20691E18138F0AD1154BF8356BFABFE5F43C4BADC66C367
                                                                                                          SHA-512:6BFEB58A5CD30CC27A410B292878AF214F711B21141DCCB5225FACC2B0269FFA17701F8878F933132545207FAAD99FB4ED7EC41298C20D474516430528B72B5F
                                                                                                          Malicious:false
                                                                                                          Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):60
                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                          Malicious:false
                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                          Process:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          File Type:XML 1.0 document, ASCII text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1576
                                                                                                          Entropy (8bit):5.11797655864606
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtatEJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTy0v
                                                                                                          MD5:5018C5304DE895FDDB79CF1ED611362A
                                                                                                          SHA1:5FA47DAE370603E96D068D09682718819EA6AC1E
                                                                                                          SHA-256:990A54003E1B78436FE286255AE67E60452F3D5322E8E6A5656E25D5FBC1F67F
                                                                                                          SHA-512:BB8D06519790DF8D929DB7E217507D4B81463F07AF4F1ABCB8AE348653BFD437A3A4524CF6E6A9788DDDF2B6FEA5B7BBCED65D0136424A4A429580247511A3C8
                                                                                                          Malicious:true
                                                                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                          Process:C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          File Type:XML 1.0 document, ASCII text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1576
                                                                                                          Entropy (8bit):5.11797655864606
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtatEJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTy0v
                                                                                                          MD5:5018C5304DE895FDDB79CF1ED611362A
                                                                                                          SHA1:5FA47DAE370603E96D068D09682718819EA6AC1E
                                                                                                          SHA-256:990A54003E1B78436FE286255AE67E60452F3D5322E8E6A5656E25D5FBC1F67F
                                                                                                          SHA-512:BB8D06519790DF8D929DB7E217507D4B81463F07AF4F1ABCB8AE348653BFD437A3A4524CF6E6A9788DDDF2B6FEA5B7BBCED65D0136424A4A429580247511A3C8
                                                                                                          Malicious:false
                                                                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                          Process:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):859136
                                                                                                          Entropy (8bit):7.490482123563364
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:ePGzJe7dETlnrPtl16CtyEZOnwwvxWs6xyCx2BU3QeFh7j6wIF:dUmTxLvw19nwwAdoCx2e3jiJF
                                                                                                          MD5:8B57457C486A24230C0FCC907EE84062
                                                                                                          SHA1:AAB3BA33F51878F115EB64F3D3ADF3CE90F306FB
                                                                                                          SHA-256:C6CA7A0C812B140B8D3E1F7CEB12F0EFE6BC0F564C6312814BC9DBA1255E8788
                                                                                                          SHA-512:3101846CE3A5A40B9C851671D6D3A0EE15567B276B809BE844B875139D14961D76D9A55C4669CC5F1C40DA00B1B028F12A37C10AB37DB0DFC65F7EA94C142C36
                                                                                                          Malicious:true
                                                                                                          Antivirus:
                                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                          • Antivirus: ReversingLabs, Detection: 63%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.Rg..............0..`............... ........@.. .......................`............@.................................8...O.......`....................@....................................................... ............... ..H............text...._... ...`.................. ..`.rsrc...`............b..............@..@.reloc.......@......................@..B................l.......H.......L8...!...........Y..`%..........................................&.(......*...0.............X.+..*....0.............Y.+..*....0.............Z.+..*....0............"........,."...?....[.+..*.0..(.................,...+....Y(.......Y(....X.+..*.0..!........~.........,.s.........~.....+..*....0..R........r...p..r...p(....t......rc..po.......o......rm..po.....s.......o......+-..(.........(....r...p..(....r...p(....o....&..( ...-...........o!.....("....o#...o$.......ijo%....
                                                                                                          Process:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26
                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                          Malicious:true
                                                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Entropy (8bit):7.490482123563364
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                                          File name:Overdue_payment.pdf.exe
                                                                                                          File size:859'136 bytes
                                                                                                          MD5:8b57457c486a24230c0fcc907ee84062
                                                                                                          SHA1:aab3ba33f51878f115eb64f3d3adf3ce90f306fb
                                                                                                          SHA256:c6ca7a0c812b140b8d3e1f7ceb12f0efe6bc0f564c6312814bc9dba1255e8788
                                                                                                          SHA512:3101846ce3a5a40b9c851671d6d3a0ee15567b276b809be844b875139d14961d76d9a55c4669cc5f1c40da00b1b028f12a37c10ab37db0dfc65f7ea94c142c36
                                                                                                          SSDEEP:12288:ePGzJe7dETlnrPtl16CtyEZOnwwvxWs6xyCx2BU3QeFh7j6wIF:dUmTxLvw19nwwAdoCx2e3jiJF
                                                                                                          TLSH:A8050407A82D89B2DE38A33D0511D9F9A1F41D9C55C8B2164BB9BD7EF83C8211D1F92E
                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.Rg..............0..`............... ........@.. .......................`............@................................
                                                                                                          Icon Hash:2946e68e96b3ca4d
                                                                                                          Entrypoint:0x4a7f8a
                                                                                                          Entrypoint Section:.text
                                                                                                          Digitally signed:false
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x67528552 [Fri Dec 6 05:02:10 2024 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:4
                                                                                                          OS Version Minor:0
                                                                                                          File Version Major:4
                                                                                                          File Version Minor:0
                                                                                                          Subsystem Version Major:4
                                                                                                          Subsystem Version Minor:0
                                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                          Instruction
                                                                                                          jmp dword ptr [00402000h]
                                                                                                          push ebx
                                                                                                          add byte ptr [ecx+00h], bh
                                                                                                          jnc 00007F96B4D14412h
                                                                                                          je 00007F96B4D14412h
                                                                                                          add byte ptr [ebp+00h], ch
                                                                                                          add byte ptr [ecx+00h], al
                                                                                                          arpl word ptr [eax], ax
                                                                                                          je 00007F96B4D14412h
                                                                                                          imul eax, dword ptr [eax], 00610076h
                                                                                                          je 00007F96B4D14412h
                                                                                                          outsd
                                                                                                          add byte ptr [edx+00h], dh
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add al, 00h
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add al, 00h
                                                                                                          add eax, dword ptr [eax]
                                                                                                          add byte ptr [eax], al
                                                                                                          xor byte ptr [eax], al
                                                                                                          add byte ptr [eax+0000000Eh], al
                                                                                                          mov byte ptr [eax], al
                                                                                                          add byte ptr [eax+00000010h], al
                                                                                                          test al, 00h
                                                                                                          add byte ptr [eax+00000018h], al
                                                                                                          rol byte ptr [eax], 00000000h
                                                                                                          add byte ptr [eax], 00000000h
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add al, 00h
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          or dword ptr [eax], eax
                                                                                                          add dword ptr [eax], eax
                                                                                                          add byte ptr [eax], al
                                                                                                          fadd dword ptr [eax]
                                                                                                          add byte ptr [eax+00000002h], al
                                                                                                          lock add byte ptr [eax], al
                                                                                                          add byte ptr [ebx], 00000000h
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa7f380x4f.text
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x2b760.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xd40000xc.reloc
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          .text0x20000xa5fb00xa60003aa60354638c9b89122db397fed364a1False0.9318156414721386data7.78729195951309IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          .rsrc0xa80000x2b7600x2b80057bc12ec3a3c0aec57ce65299d3991f2False0.20974766522988506data5.130442113306273IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          .reloc0xd40000xc0x2002cab2766266d8cf627f3d39f519ccc37False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_ICON0xa82e00x3751PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9929383518113127
                                                                                                          RT_ICON0xaba340x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.0891251626641429
                                                                                                          RT_ICON0xbc25c0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.13335610678999368
                                                                                                          RT_ICON0xc57040x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.16816081330868762
                                                                                                          RT_ICON0xcab8c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.15594000944733113
                                                                                                          RT_ICON0xcedb40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23392116182572614
                                                                                                          RT_ICON0xd135c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.274624765478424
                                                                                                          RT_ICON0xd24040x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41885245901639345
                                                                                                          RT_ICON0xd2d8c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5
                                                                                                          RT_GROUP_ICON0xd31f40x84data0.7045454545454546
                                                                                                          RT_GROUP_ICON0xd32780x14data1.05
                                                                                                          RT_VERSION0xd328c0x2e8data0.4327956989247312
                                                                                                          RT_MANIFEST0xd35740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                          DLLImport
                                                                                                          mscoree.dll_CorExeMain
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 7, 2024 05:33:01.350500107 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:01.350533962 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:01.350644112 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:01.358824015 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:01.358839035 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:02.577302933 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:02.577409983 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:02.613600016 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:02.613617897 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:02.613920927 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:02.731827974 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:02.837492943 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:02.883327007 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:03.187841892 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:03.187908888 CET44349733172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:03.187972069 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:03.194797993 CET49733443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:04.053900003 CET4973525192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:05.156918049 CET4973525192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:05.163402081 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:05.163444996 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:05.163535118 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:05.168292046 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:05.168303013 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.379400969 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.379473925 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:06.381390095 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:06.381398916 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.381643057 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.433756113 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:06.475332022 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.828893900 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.828958988 CET44349736172.67.74.152192.168.2.4
                                                                                                          Dec 7, 2024 05:33:06.829204082 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:06.838840008 CET49736443192.168.2.4172.67.74.152
                                                                                                          Dec 7, 2024 05:33:07.169226885 CET4973525192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:08.338046074 CET4973825192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:09.356688023 CET4973825192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:11.169243097 CET4973525192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:11.372363091 CET4973825192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:15.372389078 CET4973825192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:19.169482946 CET4973525192.168.2.446.175.148.58
                                                                                                          Dec 7, 2024 05:33:23.372426033 CET4973825192.168.2.446.175.148.58
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 7, 2024 05:33:01.166951895 CET5674053192.168.2.41.1.1.1
                                                                                                          Dec 7, 2024 05:33:01.304126978 CET53567401.1.1.1192.168.2.4
                                                                                                          Dec 7, 2024 05:33:03.827274084 CET5295753192.168.2.41.1.1.1
                                                                                                          Dec 7, 2024 05:33:04.053292036 CET53529571.1.1.1192.168.2.4
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Dec 7, 2024 05:33:01.166951895 CET192.168.2.41.1.1.10xefd6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 7, 2024 05:33:03.827274084 CET192.168.2.41.1.1.10x8deaStandard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Dec 7, 2024 05:33:01.304126978 CET1.1.1.1192.168.2.40xefd6No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                                          Dec 7, 2024 05:33:01.304126978 CET1.1.1.1192.168.2.40xefd6No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                                          Dec 7, 2024 05:33:01.304126978 CET1.1.1.1192.168.2.40xefd6No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                                          Dec 7, 2024 05:33:04.053292036 CET1.1.1.1192.168.2.40x8deaNo error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                                                                                          • api.ipify.org
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.449733172.67.74.1524437984C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-07 04:33:02 UTC155OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                          Host: api.ipify.org
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-07 04:33:03 UTC424INHTTP/1.1 200 OK
                                                                                                          Date: Sat, 07 Dec 2024 04:33:03 GMT
                                                                                                          Content-Type: text/plain
                                                                                                          Content-Length: 12
                                                                                                          Connection: close
                                                                                                          Vary: Origin
                                                                                                          cf-cache-status: DYNAMIC
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8ee1cb99e85cde92-EWR
                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1661&min_rtt=1651&rtt_var=641&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1680092&cwnd=240&unsent_bytes=0&cid=e7fcb45bc30780bb&ts=622&x=0"
                                                                                                          2024-12-07 04:33:03 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                                                                          Data Ascii: 8.46.123.228


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.449736172.67.74.1524433584C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-07 04:33:06 UTC155OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                          Host: api.ipify.org
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-07 04:33:06 UTC424INHTTP/1.1 200 OK
                                                                                                          Date: Sat, 07 Dec 2024 04:33:06 GMT
                                                                                                          Content-Type: text/plain
                                                                                                          Content-Length: 12
                                                                                                          Connection: close
                                                                                                          Vary: Origin
                                                                                                          cf-cache-status: DYNAMIC
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8ee1cbb09b3b4331-EWR
                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1675&min_rtt=1666&rtt_var=642&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1680092&cwnd=233&unsent_bytes=0&cid=422aeb523caa2f23&ts=454&x=0"
                                                                                                          2024-12-07 04:33:06 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                                                                          Data Ascii: 8.46.123.228


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:23:32:56
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                                                                                                          Imagebase:0xf50000
                                                                                                          File size:859'136 bytes
                                                                                                          MD5 hash:8B57457C486A24230C0FCC907EE84062
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1702589790.0000000004339000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:2
                                                                                                          Start time:23:32:58
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                                                                                                          Imagebase:0xd70000
                                                                                                          File size:433'152 bytes
                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:3
                                                                                                          Start time:23:32:58
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:23:32:58
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"
                                                                                                          Imagebase:0xd70000
                                                                                                          File size:433'152 bytes
                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:23:32:59
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:6
                                                                                                          Start time:23:32:59
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpE707.tmp"
                                                                                                          Imagebase:0xcf0000
                                                                                                          File size:187'904 bytes
                                                                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:7
                                                                                                          Start time:23:32:59
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:8
                                                                                                          Start time:23:32:59
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Users\user\Desktop\Overdue_payment.pdf.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\Overdue_payment.pdf.exe"
                                                                                                          Imagebase:0xdb0000
                                                                                                          File size:859'136 bytes
                                                                                                          MD5 hash:8B57457C486A24230C0FCC907EE84062
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2924377723.000000000318C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2921935892.0000000000437000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2924377723.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:9
                                                                                                          Start time:23:33:00
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          Imagebase:0x20000
                                                                                                          File size:859'136 bytes
                                                                                                          MD5 hash:8B57457C486A24230C0FCC907EE84062
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 100%, Avira
                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                          • Detection: 63%, ReversingLabs
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:10
                                                                                                          Start time:23:33:01
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                          Imagebase:0x7ff693ab0000
                                                                                                          File size:496'640 bytes
                                                                                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:11
                                                                                                          Start time:23:33:04
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lxZwKFTCWa" /XML "C:\Users\user\AppData\Local\Temp\tmpFB89.tmp"
                                                                                                          Imagebase:0xcf0000
                                                                                                          File size:187'904 bytes
                                                                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:12
                                                                                                          Start time:23:33:04
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:13
                                                                                                          Start time:23:33:04
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Roaming\lxZwKFTCWa.exe"
                                                                                                          Imagebase:0xc70000
                                                                                                          File size:859'136 bytes
                                                                                                          MD5 hash:8B57457C486A24230C0FCC907EE84062
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.2924376816.000000000313C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.2924376816.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.2924376816.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:16
                                                                                                          Start time:23:33:20
                                                                                                          Start date:06/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Reset < >

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:10.5%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:5%
                                                                                                            Total number of Nodes:260
                                                                                                            Total number of Limit Nodes:11
                                                                                                            execution_graph 22374 3184668 22375 318467a 22374->22375 22376 3184686 22375->22376 22380 3184778 22375->22380 22385 3183e28 22376->22385 22378 31846a5 22381 318479d 22380->22381 22389 3184888 22381->22389 22393 3184878 22381->22393 22382 31847a7 22382->22376 22386 3183e33 22385->22386 22401 3185d1c 22386->22401 22388 3186ffb 22388->22378 22390 31848af 22389->22390 22392 318498c 22390->22392 22397 31844b0 22390->22397 22392->22382 22394 31848af 22393->22394 22395 31844b0 CreateActCtxA 22394->22395 22396 318498c 22394->22396 22395->22396 22396->22382 22398 3185918 CreateActCtxA 22397->22398 22400 31859db 22398->22400 22402 3185d27 22401->22402 22405 3185d3c 22402->22405 22404 31872b5 22404->22388 22406 3185d47 22405->22406 22409 3185d6c 22406->22409 22408 318739a 22408->22404 22410 3185d77 22409->22410 22413 3185d9c 22410->22413 22412 318748d 22412->22408 22414 3185da7 22413->22414 22416 31889eb 22414->22416 22419 318ac90 22414->22419 22415 3188a29 22415->22412 22416->22415 22422 318cd81 22416->22422 22427 318b0d0 22419->22427 22423 318cdb1 22422->22423 22424 318cdd5 22423->22424 22435 318d348 22423->22435 22439 318d339 22423->22439 22424->22415 22430 318b1c8 22427->22430 22428 318aca6 22428->22416 22431 318b1d9 22430->22431 22432 318b1fc 22430->22432 22431->22432 22433 318b400 GetModuleHandleW 22431->22433 22432->22428 22434 318b42d 22433->22434 22434->22428 22436 318d355 22435->22436 22437 318d38f 22436->22437 22443 318d170 22436->22443 22437->22424 22440 318d355 22439->22440 22441 318d38f 22440->22441 22442 318d170 GetModuleHandleW 22440->22442 22441->22424 22442->22441 22444 318d17b 22443->22444 22446 318dca0 22444->22446 22447 318d28c 22444->22447 22446->22446 22448 318d297 22447->22448 22449 3185d9c GetModuleHandleW 22448->22449 22450 318dd0f 22449->22450 22450->22446 22451 318d6a8 DuplicateHandle 22452 318d73e 22451->22452 22453 5e4a510 22454 5e4a69b 22453->22454 22456 5e4a536 22453->22456 22456->22454 22457 5e43380 22456->22457 22458 5e4a790 PostMessageW 22457->22458 22459 5e4a7fc 22458->22459 22459->22456 22460 5e46e32 22461 5e46e3c 22460->22461 22462 5e470d1 22460->22462 22463 5e47078 22462->22463 22467 5e493be 22462->22467 22490 5e49358 22462->22490 22512 5e49348 22462->22512 22468 5e4934c 22467->22468 22470 5e493c1 22467->22470 22534 5e498e5 22468->22534 22539 5e49b5a 22468->22539 22545 5e49a79 22468->22545 22550 5e49c58 22468->22550 22555 5e49698 22468->22555 22561 5e49a5c 22468->22561 22566 5e4993c 22468->22566 22572 5e49b33 22468->22572 22577 5e4a0f0 22468->22577 22582 5e49ed0 22468->22582 22587 5e498f7 22468->22587 22593 5e49bb6 22468->22593 22598 5e49d35 22468->22598 22603 5e49974 22468->22603 22611 5e499c8 22468->22611 22615 5e49b0f 22468->22615 22623 5e49901 22468->22623 22629 5e49a27 22468->22629 22634 5e4a065 22468->22634 22469 5e4937a 22469->22463 22491 5e49372 22490->22491 22493 5e498e5 2 API calls 22491->22493 22494 5e4a065 3 API calls 22491->22494 22495 5e49a27 2 API calls 22491->22495 22496 5e49901 3 API calls 22491->22496 22497 5e49b0f 4 API calls 22491->22497 22498 5e499c8 2 API calls 22491->22498 22499 5e49974 5 API calls 22491->22499 22500 5e49d35 2 API calls 22491->22500 22501 5e49bb6 2 API calls 22491->22501 22502 5e498f7 3 API calls 22491->22502 22503 5e49ed0 2 API calls 22491->22503 22504 5e4a0f0 2 API calls 22491->22504 22505 5e49b33 2 API calls 22491->22505 22506 5e4993c 3 API calls 22491->22506 22507 5e49a5c 2 API calls 22491->22507 22508 5e49698 2 API calls 22491->22508 22509 5e49c58 2 API calls 22491->22509 22510 5e49a79 2 API calls 22491->22510 22511 5e49b5a 3 API calls 22491->22511 22492 5e4937a 22492->22463 22493->22492 22494->22492 22495->22492 22496->22492 22497->22492 22498->22492 22499->22492 22500->22492 22501->22492 22502->22492 22503->22492 22504->22492 22505->22492 22506->22492 22507->22492 22508->22492 22509->22492 22510->22492 22511->22492 22513 5e49372 22512->22513 22515 5e498e5 2 API calls 22513->22515 22516 5e4a065 3 API calls 22513->22516 22517 5e49a27 2 API calls 22513->22517 22518 5e49901 3 API calls 22513->22518 22519 5e49b0f 4 API calls 22513->22519 22520 5e499c8 2 API calls 22513->22520 22521 5e49974 5 API calls 22513->22521 22522 5e49d35 2 API calls 22513->22522 22523 5e49bb6 2 API calls 22513->22523 22524 5e498f7 3 API calls 22513->22524 22525 5e49ed0 2 API calls 22513->22525 22526 5e4a0f0 2 API calls 22513->22526 22527 5e49b33 2 API calls 22513->22527 22528 5e4993c 3 API calls 22513->22528 22529 5e49a5c 2 API calls 22513->22529 22530 5e49698 2 API calls 22513->22530 22531 5e49c58 2 API calls 22513->22531 22532 5e49a79 2 API calls 22513->22532 22533 5e49b5a 3 API calls 22513->22533 22514 5e4937a 22514->22463 22515->22514 22516->22514 22517->22514 22518->22514 22519->22514 22520->22514 22521->22514 22522->22514 22523->22514 22524->22514 22525->22514 22526->22514 22527->22514 22528->22514 22529->22514 22530->22514 22531->22514 22532->22514 22533->22514 22535 5e497f2 22534->22535 22536 5e498c5 22534->22536 22640 5e469f4 22535->22640 22644 5e46a00 22535->22644 22536->22469 22540 5e498ed 22539->22540 22648 5e460f8 22540->22648 22652 5e460f0 22540->22652 22656 5e46197 22540->22656 22541 5e4a091 22546 5e499c7 22545->22546 22547 5e499f6 22546->22547 22661 5e46770 22546->22661 22665 5e46778 22546->22665 22547->22469 22551 5e49f5c 22550->22551 22669 5e466b0 22551->22669 22673 5e466b8 22551->22673 22552 5e49f7a 22557 5e496cb 22555->22557 22556 5e4a2e2 22556->22469 22557->22556 22559 5e469f4 CreateProcessA 22557->22559 22560 5e46a00 CreateProcessA 22557->22560 22558 5e498c5 22558->22469 22559->22558 22560->22558 22562 5e49a69 22561->22562 22564 5e46770 WriteProcessMemory 22562->22564 22565 5e46778 WriteProcessMemory 22562->22565 22563 5e4a128 22564->22563 22565->22563 22567 5e498ed 22566->22567 22567->22566 22569 5e46197 ResumeThread 22567->22569 22570 5e460f0 ResumeThread 22567->22570 22571 5e460f8 ResumeThread 22567->22571 22568 5e4a091 22569->22568 22570->22568 22571->22568 22573 5e49e0f 22572->22573 22575 5e46770 WriteProcessMemory 22573->22575 22576 5e46778 WriteProcessMemory 22573->22576 22574 5e49ffd 22575->22574 22576->22574 22578 5e4a0f6 22577->22578 22580 5e46770 WriteProcessMemory 22578->22580 22581 5e46778 WriteProcessMemory 22578->22581 22579 5e4a128 22580->22579 22581->22579 22583 5e49d4c 22582->22583 22584 5e49edd 22582->22584 22677 5e46861 22583->22677 22681 5e46868 22583->22681 22584->22469 22588 5e498ed 22587->22588 22590 5e46197 ResumeThread 22588->22590 22591 5e460f0 ResumeThread 22588->22591 22592 5e460f8 ResumeThread 22588->22592 22589 5e4a091 22590->22589 22591->22589 22592->22589 22594 5e49bc8 22593->22594 22596 5e466b0 VirtualAllocEx 22594->22596 22597 5e466b8 VirtualAllocEx 22594->22597 22595 5e49f7a 22596->22595 22597->22595 22599 5e49d3b 22598->22599 22601 5e46861 ReadProcessMemory 22599->22601 22602 5e46868 ReadProcessMemory 22599->22602 22600 5e4a198 22600->22469 22601->22600 22602->22600 22685 5e465e0 22603->22685 22689 5e465d8 22603->22689 22604 5e4998e 22606 5e46197 ResumeThread 22604->22606 22607 5e460f0 ResumeThread 22604->22607 22608 5e460f8 ResumeThread 22604->22608 22605 5e4a091 22606->22605 22607->22605 22608->22605 22613 5e46770 WriteProcessMemory 22611->22613 22614 5e46778 WriteProcessMemory 22611->22614 22612 5e499f6 22612->22469 22613->22612 22614->22612 22616 5e49f49 22615->22616 22617 5e49a55 22615->22617 22616->22617 22618 5e4a198 22616->22618 22621 5e465e0 Wow64SetThreadContext 22616->22621 22622 5e465d8 Wow64SetThreadContext 22616->22622 22619 5e46861 ReadProcessMemory 22617->22619 22620 5e46868 ReadProcessMemory 22617->22620 22618->22469 22619->22618 22620->22618 22621->22616 22622->22616 22624 5e498e4 22623->22624 22626 5e46197 ResumeThread 22624->22626 22627 5e460f0 ResumeThread 22624->22627 22628 5e460f8 ResumeThread 22624->22628 22625 5e4a091 22626->22625 22627->22625 22628->22625 22630 5e49a55 22629->22630 22632 5e46861 ReadProcessMemory 22630->22632 22633 5e46868 ReadProcessMemory 22630->22633 22631 5e4a198 22631->22469 22632->22631 22633->22631 22635 5e4a06b 22634->22635 22637 5e46197 ResumeThread 22635->22637 22638 5e460f0 ResumeThread 22635->22638 22639 5e460f8 ResumeThread 22635->22639 22636 5e4a091 22637->22636 22638->22636 22639->22636 22641 5e46a89 CreateProcessA 22640->22641 22643 5e46c4b 22641->22643 22645 5e46a89 CreateProcessA 22644->22645 22647 5e46c4b 22645->22647 22649 5e46138 ResumeThread 22648->22649 22651 5e46169 22649->22651 22651->22541 22653 5e46138 ResumeThread 22652->22653 22655 5e46169 22653->22655 22655->22541 22657 5e46132 ResumeThread 22656->22657 22660 5e461a2 22656->22660 22659 5e46169 22657->22659 22659->22541 22660->22541 22662 5e467c0 WriteProcessMemory 22661->22662 22664 5e46817 22662->22664 22664->22547 22666 5e467c0 WriteProcessMemory 22665->22666 22668 5e46817 22666->22668 22668->22547 22670 5e466b8 VirtualAllocEx 22669->22670 22672 5e46735 22670->22672 22672->22552 22674 5e466f8 VirtualAllocEx 22673->22674 22676 5e46735 22674->22676 22676->22552 22678 5e46868 ReadProcessMemory 22677->22678 22680 5e468f7 22678->22680 22680->22584 22682 5e468b3 ReadProcessMemory 22681->22682 22684 5e468f7 22682->22684 22684->22584 22686 5e46625 Wow64SetThreadContext 22685->22686 22688 5e4666d 22686->22688 22688->22604 22690 5e465e0 Wow64SetThreadContext 22689->22690 22692 5e4666d 22690->22692 22692->22604 22693 318d460 22694 318d4a6 GetCurrentProcess 22693->22694 22696 318d4f8 GetCurrentThread 22694->22696 22697 318d4f1 22694->22697 22698 318d52e 22696->22698 22699 318d535 GetCurrentProcess 22696->22699 22697->22696 22698->22699 22702 318d56b 22699->22702 22700 318d593 GetCurrentThreadId 22701 318d5c4 22700->22701 22702->22700

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 627 5e46197-5e461a0 628 5e46132-5e46167 ResumeThread 627->628 629 5e461a2-5e461d7 627->629 645 5e46170-5e46195 628->645 646 5e46169-5e4616f 628->646 631 5e461de-5e46237 629->631 632 5e461d9 629->632 634 5e4623d-5e4623f 631->634 635 5e4634a-5e4635b 631->635 632->631 634->635 638 5e46245-5e46275 634->638 636 5e463d3-5e463e4 635->636 637 5e4635d-5e4635f 635->637 640 5e465c3-5e465cd 636->640 641 5e463ea-5e463ec 636->641 637->636 642 5e46361-5e46371 637->642 643 5e46277 638->643 644 5e4627c-5e4628d 638->644 641->640 647 5e463f2-5e46422 641->647 648 5e46382 642->648 649 5e46373-5e46380 642->649 643->644 650 5e46294-5e462aa 644->650 651 5e4628f 644->651 646->645 655 5e46424 647->655 656 5e46429-5e4643a 647->656 658 5e46385-5e463c0 648->658 649->658 652 5e462b1-5e462c7 650->652 653 5e462ac 650->653 651->650 659 5e462ce-5e46329 652->659 660 5e462c9 652->660 653->652 655->656 661 5e46441-5e46457 656->661 662 5e4643c 656->662 677 5e463c7-5e463ce 658->677 678 5e463c2 658->678 686 5e46333 659->686 687 5e4632b-5e46331 659->687 660->659 665 5e4645e-5e46474 661->665 666 5e46459 661->666 662->661 669 5e46476 665->669 670 5e4647b-5e464b8 665->670 666->665 669->670 672 5e464bf-5e464d0 670->672 673 5e464ba 670->673 674 5e464d7-5e464ed 672->674 675 5e464d2 672->675 673->672 679 5e464f4-5e4650a 674->679 680 5e464ef 674->680 675->674 677->640 678->677 681 5e46511-5e46530 679->681 682 5e4650c 679->682 680->679 684 5e46532-5e46538 681->684 685 5e4653a 681->685 682->681 688 5e4653d-5e465ab 684->688 685->688 689 5e46336-5e46345 686->689 687->689 696 5e465b5 688->696 697 5e465ad-5e465b3 688->697 689->640 698 5e465b8-5e465c0 696->698 697->698 698->640
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: f4a96d3ea5facd79c25b8786701429c875ca87364d371823f17421c80ad59dd5
                                                                                                            • Instruction ID: 2217afc7678bf51ba0e9595bb39c5b379bc48d23c28b420b81bbe5880a36c24e
                                                                                                            • Opcode Fuzzy Hash: f4a96d3ea5facd79c25b8786701429c875ca87364d371823f17421c80ad59dd5
                                                                                                            • Instruction Fuzzy Hash: 8F6147B0E042198BDB14CFA9D5806AEFBF2FF89304F24D16AD449AB355D7359942CFA0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: fkq
                                                                                                            • API String ID: 0-1814508662
                                                                                                            • Opcode ID: a24a3863074c26a89b547f7ae8545afe9d3e6fd74ccb62c87558b9227c58031e
                                                                                                            • Instruction ID: 06459f9aeb38d6e28d5a071ef62e8ceba5feb658f7aea4af8f2488917194cb45
                                                                                                            • Opcode Fuzzy Hash: a24a3863074c26a89b547f7ae8545afe9d3e6fd74ccb62c87558b9227c58031e
                                                                                                            • Instruction Fuzzy Hash: 2381D274E012189FCF09DFA9C994AEEBBB2FF88310F248169D405AB365DB349945CF90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: fkq
                                                                                                            • API String ID: 0-1814508662
                                                                                                            • Opcode ID: 4e168431fa0ce0d7fac6b7749a0c64e56e8e068f7c643ff916a2526a45ef6f9e
                                                                                                            • Instruction ID: 5ab5c1cc9ed0ef79b1fc27fe2cc59739faedb494e15cad35aa5ce6a55a71112a
                                                                                                            • Opcode Fuzzy Hash: 4e168431fa0ce0d7fac6b7749a0c64e56e8e068f7c643ff916a2526a45ef6f9e
                                                                                                            • Instruction Fuzzy Hash: BE81B274E012189FCF08DFA9C994AEEBBB2FF88310F248129D405AB364DB349945CF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d0068cb12e74afd313c3c20f5493727209f3ab165cf16875265cd6107c0b43d9
                                                                                                            • Instruction ID: 70afb2870497269a8ab93c6aaba61daca3addb3c806b168b95efb8a5ee557324
                                                                                                            • Opcode Fuzzy Hash: d0068cb12e74afd313c3c20f5493727209f3ab165cf16875265cd6107c0b43d9
                                                                                                            • Instruction Fuzzy Hash: FC610771D05619CBDB28CF66D8447EABBB6BF89300F10E1EAD44DA6251EB705AC5CF40

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 294 318d450-318d4ef GetCurrentProcess 298 318d4f8-318d52c GetCurrentThread 294->298 299 318d4f1-318d4f7 294->299 300 318d52e-318d534 298->300 301 318d535-318d569 GetCurrentProcess 298->301 299->298 300->301 303 318d56b-318d571 301->303 304 318d572-318d58d call 318d62f 301->304 303->304 307 318d593-318d5c2 GetCurrentThreadId 304->307 308 318d5cb-318d62d 307->308 309 318d5c4-318d5ca 307->309 309->308
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0318D4DE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 0318D51B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0318D558
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0318D5B1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: 985a497a19018fd3e1c202f0192eef49b6092889611ee685dc236796cee88821
                                                                                                            • Instruction ID: 3fed4b2c575870b93a13d5ee3c97578a9dac5bbf0c54dc53fecadbf8f447edc6
                                                                                                            • Opcode Fuzzy Hash: 985a497a19018fd3e1c202f0192eef49b6092889611ee685dc236796cee88821
                                                                                                            • Instruction Fuzzy Hash: 405178B09013498FDB14DFA9D548BAEBFF5EF48314F24845AE409A73A0DB34A944CF69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 316 318d460-318d4ef GetCurrentProcess 320 318d4f8-318d52c GetCurrentThread 316->320 321 318d4f1-318d4f7 316->321 322 318d52e-318d534 320->322 323 318d535-318d569 GetCurrentProcess 320->323 321->320 322->323 325 318d56b-318d571 323->325 326 318d572-318d58d call 318d62f 323->326 325->326 329 318d593-318d5c2 GetCurrentThreadId 326->329 330 318d5cb-318d62d 329->330 331 318d5c4-318d5ca 329->331 331->330
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0318D4DE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 0318D51B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0318D558
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0318D5B1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: 621c5eacb53eaf12bd46b004938aff6b53264c86b755c6d6170e8f71785e0c54
                                                                                                            • Instruction ID: db0c6e06e47e4b67f14e73cf14ce4c28e2688cd11506df94a7c5cabeeb2735ec
                                                                                                            • Opcode Fuzzy Hash: 621c5eacb53eaf12bd46b004938aff6b53264c86b755c6d6170e8f71785e0c54
                                                                                                            • Instruction Fuzzy Hash: 0E5176B09003098FDB14DFA9D648B9EBFF5EF48314F248459E409A73A0CB34A944CF69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 456 5e469f4-5e46a95 458 5e46a97-5e46aa1 456->458 459 5e46ace-5e46aee 456->459 458->459 460 5e46aa3-5e46aa5 458->460 464 5e46b27-5e46b56 459->464 465 5e46af0-5e46afa 459->465 462 5e46aa7-5e46ab1 460->462 463 5e46ac8-5e46acb 460->463 466 5e46ab5-5e46ac4 462->466 467 5e46ab3 462->467 463->459 475 5e46b8f-5e46c49 CreateProcessA 464->475 476 5e46b58-5e46b62 464->476 465->464 468 5e46afc-5e46afe 465->468 466->466 469 5e46ac6 466->469 467->466 470 5e46b00-5e46b0a 468->470 471 5e46b21-5e46b24 468->471 469->463 473 5e46b0c 470->473 474 5e46b0e-5e46b1d 470->474 471->464 473->474 474->474 477 5e46b1f 474->477 487 5e46c52-5e46cd8 475->487 488 5e46c4b-5e46c51 475->488 476->475 478 5e46b64-5e46b66 476->478 477->471 480 5e46b68-5e46b72 478->480 481 5e46b89-5e46b8c 478->481 482 5e46b74 480->482 483 5e46b76-5e46b85 480->483 481->475 482->483 483->483 484 5e46b87 483->484 484->481 498 5e46ce8-5e46cec 487->498 499 5e46cda-5e46cde 487->499 488->487 500 5e46cfc-5e46d00 498->500 501 5e46cee-5e46cf2 498->501 499->498 502 5e46ce0 499->502 504 5e46d10-5e46d14 500->504 505 5e46d02-5e46d06 500->505 501->500 503 5e46cf4 501->503 502->498 503->500 507 5e46d26-5e46d2d 504->507 508 5e46d16-5e46d1c 504->508 505->504 506 5e46d08 505->506 506->504 509 5e46d44 507->509 510 5e46d2f-5e46d3e 507->510 508->507 511 5e46d45 509->511 510->509 511->511
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05E46C36
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 963392458-0
                                                                                                            • Opcode ID: 55ac4cb0303fc15ef1213f2f33951cc533d474c1a5195c232d32919cc171b929
                                                                                                            • Instruction ID: 7b8f95ce79e71aaac643bcab39d3645639f941ce25ef77e449886badeec56fbe
                                                                                                            • Opcode Fuzzy Hash: 55ac4cb0303fc15ef1213f2f33951cc533d474c1a5195c232d32919cc171b929
                                                                                                            • Instruction Fuzzy Hash: 84A17C71D002199FEF20DF68D845BEEBBB2FF49314F1481A9E849A7280DB749985CF91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 513 5e46a00-5e46a95 515 5e46a97-5e46aa1 513->515 516 5e46ace-5e46aee 513->516 515->516 517 5e46aa3-5e46aa5 515->517 521 5e46b27-5e46b56 516->521 522 5e46af0-5e46afa 516->522 519 5e46aa7-5e46ab1 517->519 520 5e46ac8-5e46acb 517->520 523 5e46ab5-5e46ac4 519->523 524 5e46ab3 519->524 520->516 532 5e46b8f-5e46c49 CreateProcessA 521->532 533 5e46b58-5e46b62 521->533 522->521 525 5e46afc-5e46afe 522->525 523->523 526 5e46ac6 523->526 524->523 527 5e46b00-5e46b0a 525->527 528 5e46b21-5e46b24 525->528 526->520 530 5e46b0c 527->530 531 5e46b0e-5e46b1d 527->531 528->521 530->531 531->531 534 5e46b1f 531->534 544 5e46c52-5e46cd8 532->544 545 5e46c4b-5e46c51 532->545 533->532 535 5e46b64-5e46b66 533->535 534->528 537 5e46b68-5e46b72 535->537 538 5e46b89-5e46b8c 535->538 539 5e46b74 537->539 540 5e46b76-5e46b85 537->540 538->532 539->540 540->540 541 5e46b87 540->541 541->538 555 5e46ce8-5e46cec 544->555 556 5e46cda-5e46cde 544->556 545->544 557 5e46cfc-5e46d00 555->557 558 5e46cee-5e46cf2 555->558 556->555 559 5e46ce0 556->559 561 5e46d10-5e46d14 557->561 562 5e46d02-5e46d06 557->562 558->557 560 5e46cf4 558->560 559->555 560->557 564 5e46d26-5e46d2d 561->564 565 5e46d16-5e46d1c 561->565 562->561 563 5e46d08 562->563 563->561 566 5e46d44 564->566 567 5e46d2f-5e46d3e 564->567 565->564 568 5e46d45 566->568 567->566 568->568
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05E46C36
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 963392458-0
                                                                                                            • Opcode ID: e9310e02b3a99d4e30fb79f92f87030b9de3f14066757c94ee6876f21534dd49
                                                                                                            • Instruction ID: 5171c9c0a6c305e33524970fbb811e39c3f5eb6f82e68ec92b11022ba48cf921
                                                                                                            • Opcode Fuzzy Hash: e9310e02b3a99d4e30fb79f92f87030b9de3f14066757c94ee6876f21534dd49
                                                                                                            • Instruction Fuzzy Hash: E1917A71D002199FEF20DF68D845BEEBBB2FF49314F1481A9E849A7280DB749985CF91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 570 318b1c8-318b1d7 571 318b1d9-318b1e6 call 3189c38 570->571 572 318b203-318b207 570->572 579 318b1e8 571->579 580 318b1fc 571->580 573 318b209-318b213 572->573 574 318b21b-318b25c 572->574 573->574 581 318b269-318b277 574->581 582 318b25e-318b266 574->582 625 318b1ee call 318b450 579->625 626 318b1ee call 318b460 579->626 580->572 584 318b279-318b27e 581->584 585 318b29b-318b29d 581->585 582->581 583 318b1f4-318b1f6 583->580 586 318b338-318b3f8 583->586 588 318b289 584->588 589 318b280-318b287 call 318ae80 584->589 587 318b2a0-318b2a7 585->587 620 318b3fa-318b3fd 586->620 621 318b400-318b42b GetModuleHandleW 586->621 591 318b2a9-318b2b1 587->591 592 318b2b4-318b2bb 587->592 590 318b28b-318b299 588->590 589->590 590->587 591->592 595 318b2c8-318b2d1 call 318ae90 592->595 596 318b2bd-318b2c5 592->596 601 318b2de-318b2e3 595->601 602 318b2d3-318b2db 595->602 596->595 603 318b301-318b30e 601->603 604 318b2e5-318b2ec 601->604 602->601 611 318b310-318b32e 603->611 612 318b331-318b337 603->612 604->603 606 318b2ee-318b2fe call 318aea0 call 318aeb0 604->606 606->603 611->612 620->621 622 318b42d-318b433 621->622 623 318b434-318b448 621->623 622->623 625->583 626->583
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0318B41E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule
                                                                                                            • String ID:
                                                                                                            • API String ID: 4139908857-0
                                                                                                            • Opcode ID: 84693bf8bd4c621c0484be3328f0155bc30e0e3499ede2bc2ab2bc6f1eb81e67
                                                                                                            • Instruction ID: dcf15b1a038cb59eb8816f2086364d7a8a4c44cf0f94a1a5aa06bda73c55f1cc
                                                                                                            • Opcode Fuzzy Hash: 84693bf8bd4c621c0484be3328f0155bc30e0e3499ede2bc2ab2bc6f1eb81e67
                                                                                                            • Instruction Fuzzy Hash: 68713370A04B058FDB64EF6AD14075ABBF6FF88200F04892ED48AD7A50DB74E846CF94

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 700 31844b0-31859d9 CreateActCtxA 703 31859db-31859e1 700->703 704 31859e2-3185a3c 700->704 703->704 711 3185a4b-3185a4f 704->711 712 3185a3e-3185a41 704->712 713 3185a60 711->713 714 3185a51-3185a5d 711->714 712->711 716 3185a61 713->716 714->713 716->716
                                                                                                            APIs
                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 031859C9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Create
                                                                                                            • String ID:
                                                                                                            • API String ID: 2289755597-0
                                                                                                            • Opcode ID: e02aa22b0156922fd2fa1951989d2ff8d13e0e0e61a5bb098106c1f47a830244
                                                                                                            • Instruction ID: aa2fce028b44f3811db61fee7012c891380933bcaeeffeae6e7e65adb5dec0bd
                                                                                                            • Opcode Fuzzy Hash: e02aa22b0156922fd2fa1951989d2ff8d13e0e0e61a5bb098106c1f47a830244
                                                                                                            • Instruction Fuzzy Hash: 2441D3B1C00619CBDB24DFAAC984B8EBBF6FF49304F60805AD448AB251DB756945CF94

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 717 318590c-31859d9 CreateActCtxA 719 31859db-31859e1 717->719 720 31859e2-3185a3c 717->720 719->720 727 3185a4b-3185a4f 720->727 728 3185a3e-3185a41 720->728 729 3185a60 727->729 730 3185a51-3185a5d 727->730 728->727 732 3185a61 729->732 730->729 732->732
                                                                                                            APIs
                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 031859C9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Create
                                                                                                            • String ID:
                                                                                                            • API String ID: 2289755597-0
                                                                                                            • Opcode ID: c2f5cbfd9c4e03931a87a952fc7410a513b29c05a44f05acd826d9bb5571228e
                                                                                                            • Instruction ID: 3db2786568b1b18c0f3af1df35aaf21e5c5ebeff0c1887e1caaf0a21aae30c45
                                                                                                            • Opcode Fuzzy Hash: c2f5cbfd9c4e03931a87a952fc7410a513b29c05a44f05acd826d9bb5571228e
                                                                                                            • Instruction Fuzzy Hash: AC41E3B1C00619CBDB24DFAAC984BCEBBF6FF49304F24805AD448AB251DB756945CF94

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 733 5e46770-5e467c6 735 5e467d6-5e46815 WriteProcessMemory 733->735 736 5e467c8-5e467d4 733->736 738 5e46817-5e4681d 735->738 739 5e4681e-5e4684e 735->739 736->735 738->739
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05E46808
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: c965d398a958ab5191c1015fbd9ec9e26b907b0bce7cf81f5786c519574d328a
                                                                                                            • Instruction ID: 61a42fa6fd69bdb6bf736914958bd57468bd7c4dfbbbd14ecb33c9990df63678
                                                                                                            • Opcode Fuzzy Hash: c965d398a958ab5191c1015fbd9ec9e26b907b0bce7cf81f5786c519574d328a
                                                                                                            • Instruction Fuzzy Hash: 3C2126B29003499FDB10CFA9C985BEEBBF5FF48314F10842AE959A7240D7789A51DB60

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 743 5e46778-5e467c6 745 5e467d6-5e46815 WriteProcessMemory 743->745 746 5e467c8-5e467d4 743->746 748 5e46817-5e4681d 745->748 749 5e4681e-5e4684e 745->749 746->745 748->749
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05E46808
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: 6c797b06c17dd675fec6e7f955e26e9087aae299d7e15f8376c7a4dcfbe9b684
                                                                                                            • Instruction ID: 4fdcb3c9775eafaf217b83a13452bf9e15807d5957c4e68f0020f5c79473cb01
                                                                                                            • Opcode Fuzzy Hash: 6c797b06c17dd675fec6e7f955e26e9087aae299d7e15f8376c7a4dcfbe9b684
                                                                                                            • Instruction Fuzzy Hash: C8212AB29003499FDB10CFA9C985BDEBBF5FF48314F108429E959A7240C7789540DF60

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 753 5e465d8-5e4662b 756 5e4662d-5e46639 753->756 757 5e4663b-5e4666b Wow64SetThreadContext 753->757 756->757 759 5e46674-5e466a4 757->759 760 5e4666d-5e46673 757->760 760->759
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05E4665E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: d04c60bffa99d13963a99a1fc7b826834519b35ff1f4039d84a8893e7f9f7828
                                                                                                            • Instruction ID: ff96a450bce2ca52a87e4b6c2b14ef9965ad8ebd3b5d7e832130c8778d15d80c
                                                                                                            • Opcode Fuzzy Hash: d04c60bffa99d13963a99a1fc7b826834519b35ff1f4039d84a8893e7f9f7828
                                                                                                            • Instruction Fuzzy Hash: 642139B19003098FDB10CFAAC585BEEBBF5EF88324F14842AE459A7340CB789545CFA5
                                                                                                            APIs
                                                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05E468E8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 1726664587-0
                                                                                                            • Opcode ID: 1fd3ba05a279b8f8c5d939440dec6429708ed09ad07080523735448dfc7e8e70
                                                                                                            • Instruction ID: 7f33ba80692e77ce54e8992b896c6d07cb5481d528e6d16497ad1929cc8ff6e9
                                                                                                            • Opcode Fuzzy Hash: 1fd3ba05a279b8f8c5d939440dec6429708ed09ad07080523735448dfc7e8e70
                                                                                                            • Instruction Fuzzy Hash: B42116B19003499FDB10DFAAD985ADEFBF5FF48320F50842AE919A7240CB799501DFA1
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05E4665E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: 7e21b590f146c294345eda995422254ce338ce847cf1fa413ec595b4ca5568bb
                                                                                                            • Instruction ID: c9f4e5e83c7852f68070e2c795a9bc7adf32fc9484938e6c6c5a8b87a9efab09
                                                                                                            • Opcode Fuzzy Hash: 7e21b590f146c294345eda995422254ce338ce847cf1fa413ec595b4ca5568bb
                                                                                                            • Instruction Fuzzy Hash: 742118B19003098FDB10DFAAC585BAEBBF4EF98324F14842AD559A7240CB789945CFA5
                                                                                                            APIs
                                                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05E468E8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 1726664587-0
                                                                                                            • Opcode ID: 4130631681e82e128a78f6d4e470a87a3a49448dc553c3694edc6865ef795ff1
                                                                                                            • Instruction ID: c339553318ed1eccc8447bf010828da2cc5dd90401f1faadba1c9856d987f8e4
                                                                                                            • Opcode Fuzzy Hash: 4130631681e82e128a78f6d4e470a87a3a49448dc553c3694edc6865ef795ff1
                                                                                                            • Instruction Fuzzy Hash: 182128B1D003499FDB10DFAAC981ADEFBF5FF48320F10842AE919A7240C7789500DBA1
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0318D72F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: 2159d5d4aff758488aac919a2a3bdbca6d2d825a08236e701b1e12fbb75e5bbf
                                                                                                            • Instruction ID: 448429ac1727794314b7be37f27cfd710aa6cb820c03b331d6865b51c4a0ede8
                                                                                                            • Opcode Fuzzy Hash: 2159d5d4aff758488aac919a2a3bdbca6d2d825a08236e701b1e12fbb75e5bbf
                                                                                                            • Instruction Fuzzy Hash: DD21E4B59002499FDB10CFAAD984ADEFFF9EB48320F14801AE914A3350D374A940CF64
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0318D72F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: 7cd41b9c8353fdb21f4decec2be420e708ba5c43624f321dc970048bab7eb893
                                                                                                            • Instruction ID: 19cd9a2b27bdfb36cdbf3654573dfa5c328b3349451485b9fbbf213adaf88913
                                                                                                            • Opcode Fuzzy Hash: 7cd41b9c8353fdb21f4decec2be420e708ba5c43624f321dc970048bab7eb893
                                                                                                            • Instruction Fuzzy Hash: 5E21E0B5D003499FDB10CFAAD584ADEFBF5EB48324F24842AE914A3350D378AA40CF64
                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05E46726
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: d9c4c047483ef888b70b3f6548058b8e138e0a58989a2347e9432901acbb3b50
                                                                                                            • Instruction ID: 6f6447cf2e38ec0bed120490128bf36280d8b41164d4dd73a0a0b6bf04b34973
                                                                                                            • Opcode Fuzzy Hash: d9c4c047483ef888b70b3f6548058b8e138e0a58989a2347e9432901acbb3b50
                                                                                                            • Instruction Fuzzy Hash: 7F1167729002098FDB10CFAAD845ADEBFF5EB88320F14841AE519A7250C77AA500DFA0
                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05E46726
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: eb5b154d9f1b32a0a0c0f0f37f2691d9080407072bb28cecc6cdeda8c8d0495c
                                                                                                            • Instruction ID: 7895fe67771812f8e471af8533d44166d8ada531be5101db8a64b39596750810
                                                                                                            • Opcode Fuzzy Hash: eb5b154d9f1b32a0a0c0f0f37f2691d9080407072bb28cecc6cdeda8c8d0495c
                                                                                                            • Instruction Fuzzy Hash: BA1167B29002498FDB10DFAAC845ADFFFF5EF88320F208419E519A7250C775A540DFA0
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: 984b93491121703d1fa971525fb4e42f6420351589553d70e443ac826aaf0947
                                                                                                            • Instruction ID: aa1d023e20374c9e84bfbdb862056b7f4c3385286dd59cf25bac60d169935de0
                                                                                                            • Opcode Fuzzy Hash: 984b93491121703d1fa971525fb4e42f6420351589553d70e443ac826aaf0947
                                                                                                            • Instruction Fuzzy Hash: 5D1155B1D003498FDB20DFAAC8457AEFBF5AF88324F24841AD559A7340CB79A940CF94
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: d9a1b54091a0fb294ed899b81ce96484bcba58d1104f542ad8764f23ed1350b0
                                                                                                            • Instruction ID: 9ad1e60a2f02bdf7b80f4513f297a5cc5fa77fc9629badd03aa93194bd3b0d3c
                                                                                                            • Opcode Fuzzy Hash: d9a1b54091a0fb294ed899b81ce96484bcba58d1104f542ad8764f23ed1350b0
                                                                                                            • Instruction Fuzzy Hash: 621128B19003498BDB20DFAAC44579EFBF5EB88324F248419D519A7340CB75A540CF95
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0318B41E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule
                                                                                                            • String ID:
                                                                                                            • API String ID: 4139908857-0
                                                                                                            • Opcode ID: b91836e34f6019d3a8b18f8157a109d616f39106b0d181479e519060e62d37be
                                                                                                            • Instruction ID: 10e40e419a92a15d83b96b330a13b7ad9cd45b607580ef7f8e93003819babcb4
                                                                                                            • Opcode Fuzzy Hash: b91836e34f6019d3a8b18f8157a109d616f39106b0d181479e519060e62d37be
                                                                                                            • Instruction Fuzzy Hash: 8B110FB6C002498FCB10DF9AC544ADEFBF4EB88324F14846AD819A7310C379A545CFA5
                                                                                                            APIs
                                                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 05E4A7ED
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 410705778-0
                                                                                                            • Opcode ID: 722ba194bd67f69763772fb3bec0e4ef31642c465fbf994fbe8907a3a7b9617c
                                                                                                            • Instruction ID: a8780c436c24fddeef50de9c4a3523ec269584ecaedd320800ba3b4b8e3bf7bb
                                                                                                            • Opcode Fuzzy Hash: 722ba194bd67f69763772fb3bec0e4ef31642c465fbf994fbe8907a3a7b9617c
                                                                                                            • Instruction Fuzzy Hash: 091128B58003499FDB20CF9AD489BDEFBF9EB48320F208459E958A3200D374A944CFA0
                                                                                                            APIs
                                                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 05E4A7ED
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 410705778-0
                                                                                                            • Opcode ID: 0ed2314e649ecc1244878ef1cb80d71b452149c0514e0a3802b8a6a14b400c90
                                                                                                            • Instruction ID: bc43f51d9e099c3005aafa6747e259d816f34e64f647c63da4ed7acc35059575
                                                                                                            • Opcode Fuzzy Hash: 0ed2314e649ecc1244878ef1cb80d71b452149c0514e0a3802b8a6a14b400c90
                                                                                                            • Instruction Fuzzy Hash: 231103B6800349CFDB10CF99D585BDEFBF5EB48320F24845AE858A3640C375A644CFA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700069515.0000000001A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A8D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a8d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 90a43e28067995fab43110196c61e86dbcbd232d095d44c18515d675922e4d4b
                                                                                                            • Instruction ID: af14d24376723305e188a903ae123833ef7b458fd5f04cb074aa4d252a002a3c
                                                                                                            • Opcode Fuzzy Hash: 90a43e28067995fab43110196c61e86dbcbd232d095d44c18515d675922e4d4b
                                                                                                            • Instruction Fuzzy Hash: B52125B5504204EFDB05EF98D9C0B66BF65FB88324F24C56DE90A0B297C336E456CBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700137648.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a9d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0ad93028e621c4d9d27bbbdc4e61004048adfc69b1e06c52c6ed76d4a942c74e
                                                                                                            • Instruction ID: bf0b5a2aeedc2c2ee57d20ba20603a2fb2446af52c2a4f0c93bdd5eb37abc15a
                                                                                                            • Opcode Fuzzy Hash: 0ad93028e621c4d9d27bbbdc4e61004048adfc69b1e06c52c6ed76d4a942c74e
                                                                                                            • Instruction Fuzzy Hash: C5210371504200DFDF15DF58D5C0B26BBA5FB84364F24C56DD90A4B246C33AD4C7CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700137648.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a9d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: eb40d645c568b4b5fd538cdf9ab832655dc6aa0fca71fce3505a7fc0649ffcad
                                                                                                            • Instruction ID: a60bef08f3cc76d16ae136261759f119261082eb8e583c559231d0937d7873a3
                                                                                                            • Opcode Fuzzy Hash: eb40d645c568b4b5fd538cdf9ab832655dc6aa0fca71fce3505a7fc0649ffcad
                                                                                                            • Instruction Fuzzy Hash: 052104B5504200EFDF05DF98D9C0B26BBA5FB84324F24C9ADE9094F296C336D4C6CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700137648.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a9d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: dda65a08faacbdef95541030587efdaabccdf37e27341ee017bee5dbd0f19ca7
                                                                                                            • Instruction ID: 51c89271f48648c6614b4d1d66a307b1eb77f3fe5352afc1aa97f862d7a351a6
                                                                                                            • Opcode Fuzzy Hash: dda65a08faacbdef95541030587efdaabccdf37e27341ee017bee5dbd0f19ca7
                                                                                                            • Instruction Fuzzy Hash: 2721A4755093808FDB13CF64D590715BFB1EB45214F28C5DAD8498B697C33AD48ACB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700069515.0000000001A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A8D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a8d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                            • Instruction ID: 466391935f03e807321c6174500ae26b5084fb1cf9e1a80f937f4ed1e40bb7e3
                                                                                                            • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                            • Instruction Fuzzy Hash: BE110372404240DFDB12DF48D5C0B56BF72FB84324F24C2A9D9090B657C33AE45ACBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700137648.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a9d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction ID: c50c5f39cdafb0df8004f8f74b26f953fdd394cf7bd22b28c506533c47ad0d96
                                                                                                            • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction Fuzzy Hash: 78118B75504280DFDB16CF54D6C4B15BBA2FB84224F24C6AAD8494B696C33AD48ACB61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700069515.0000000001A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A8D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a8d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fde3a94003ede7b3569d892affb46db76b8afd4c7423e7aaa4bf471fc457e3b9
                                                                                                            • Instruction ID: fe940104a0989785cb52166fbaf39feddc8d7af9c3a6d2c7be380a6f9adcf67f
                                                                                                            • Opcode Fuzzy Hash: fde3a94003ede7b3569d892affb46db76b8afd4c7423e7aaa4bf471fc457e3b9
                                                                                                            • Instruction Fuzzy Hash: FA01DB724043849AE7107FAACDC4B66BFA8DF41364F18C55AED095F2C2D6799841C671
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700069515.0000000001A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A8D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_1a8d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 61c77125887cb81a68b2367bcddbcc236a4857d4853466c9de1106d85d464e8c
                                                                                                            • Instruction ID: fda74901cb5a5742381b1014724a1b0a6f301c552e1326e496a48d1666562192
                                                                                                            • Opcode Fuzzy Hash: 61c77125887cb81a68b2367bcddbcc236a4857d4853466c9de1106d85d464e8c
                                                                                                            • Instruction Fuzzy Hash: 7FF0C2724043809EE710AF1AC9C4B62FF98EB41234F18C05AFD085F286C2799844CBB0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: I^Z
                                                                                                            • API String ID: 0-3459616432
                                                                                                            • Opcode ID: ab594f7a5a53516efbeb8c3a24f9779c49edbaab0d07b1085c423a84fdae8ecc
                                                                                                            • Instruction ID: 5dff00ba460349755e22747c118f5d066c68fd0b5f0dc3af607ab72a75e288f4
                                                                                                            • Opcode Fuzzy Hash: ab594f7a5a53516efbeb8c3a24f9779c49edbaab0d07b1085c423a84fdae8ecc
                                                                                                            • Instruction Fuzzy Hash: 29E116B4E041198FDB14CFA9D580AAEFBB2FF89304F249169E855AB355D730AD42CF60
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: jxQ
                                                                                                            • API String ID: 0-3241442434
                                                                                                            • Opcode ID: d0944eb9a1af5bfc01aa6324ad812225d3a79b4e57edad9c303a559033be7c5d
                                                                                                            • Instruction ID: 9f6b108b08eb2ecb811157e44d64dc0440ca879397304766f08bee78322f818e
                                                                                                            • Opcode Fuzzy Hash: d0944eb9a1af5bfc01aa6324ad812225d3a79b4e57edad9c303a559033be7c5d
                                                                                                            • Instruction Fuzzy Hash: 9CE10774E041198FDB14CFA9D5809AEBBB2FF89304F24916AD855AB355D730AD82CF60
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: I^Z
                                                                                                            • API String ID: 0-3459616432
                                                                                                            • Opcode ID: 768df1b3b304f59347700ece2be84a60e0931cdc316f5e8b47daef330babfdd2
                                                                                                            • Instruction ID: 41fc8976bd41c95f8a7c847ae3ff28f9650e27f4b17667771145ed6ba0ae0024
                                                                                                            • Opcode Fuzzy Hash: 768df1b3b304f59347700ece2be84a60e0931cdc316f5e8b47daef330babfdd2
                                                                                                            • Instruction Fuzzy Hash: 285128B1E042198BDB14CFA9D5849AEFBF2FF89304F24D169D419AB355D7309942CFA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6f29155d4385004e9629a6170473638ae4e73ca16a14c499c6e7167c853702af
                                                                                                            • Instruction ID: 021682f7ea082d368f14d134afec3c7787263b6248ad74d6c6807f0c8d553f3b
                                                                                                            • Opcode Fuzzy Hash: 6f29155d4385004e9629a6170473638ae4e73ca16a14c499c6e7167c853702af
                                                                                                            • Instruction Fuzzy Hash: A7D189747027048BEB19EB75D450BAEB7F6AF89704F24846AD18A9B290DB35E802CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8b777082c36040be41a80b699e227f2498397b9b16cbffcd65ca1510e7ceb56d
                                                                                                            • Instruction ID: 9285e18deb22e06973defe262b1a49f9c5daef46b94205a9b9cff1f62a135993
                                                                                                            • Opcode Fuzzy Hash: 8b777082c36040be41a80b699e227f2498397b9b16cbffcd65ca1510e7ceb56d
                                                                                                            • Instruction Fuzzy Hash: E5E129B4E042198FDB14DFA9C5809AEBBB2FF48304F24D169E855AB355D730AD81CF60
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b3c47a351df98f551fbbc304c8b9e3933eee4599a2fa27c58c6998b3ab56aba0
                                                                                                            • Instruction ID: fe977d61bbae772e93479541808beddb780893d0ba5d7bd9c7ba0c23ec31b99b
                                                                                                            • Opcode Fuzzy Hash: b3c47a351df98f551fbbc304c8b9e3933eee4599a2fa27c58c6998b3ab56aba0
                                                                                                            • Instruction Fuzzy Hash: B8E118B4E041198FDB14CFA9D580AAEFBB2FF89305F249169E845AB355D730AD41CFA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8498821cae107a78bf959a3e41334a117340a36093a2031a3e1cc24d84c84414
                                                                                                            • Instruction ID: 0cccc7e52b15e62254553fa4540fa1afda1209b932fe72bd77b6bb6882ca8857
                                                                                                            • Opcode Fuzzy Hash: 8498821cae107a78bf959a3e41334a117340a36093a2031a3e1cc24d84c84414
                                                                                                            • Instruction Fuzzy Hash: 0CE119B4E041198FCB14CFA9D5809AEFBB2FF89305F249169E845AB359D730AD42CF60
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1700808214.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_3180000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 59dfe81491b39bb325651090da5d4306662b1c93a23204bc89e75e004ded56a9
                                                                                                            • Instruction ID: 8e3db8002003a2367287f328a3bef049519170f814418835919d24993a4038d3
                                                                                                            • Opcode Fuzzy Hash: 59dfe81491b39bb325651090da5d4306662b1c93a23204bc89e75e004ded56a9
                                                                                                            • Instruction Fuzzy Hash: 89A15F36E00205CFCF09EFB4D8805AEB7B2FF89301B25456AE905AB265DB31E956CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: eace2beb1a2eef8f17b65b51aa0395944bbf3a097f2ad3e97fbd2da8a29c350c
                                                                                                            • Instruction ID: 96934adcf1496d2a792ec0efd2bb31abd0066cf95bb7bd71772be40a67c6bee0
                                                                                                            • Opcode Fuzzy Hash: eace2beb1a2eef8f17b65b51aa0395944bbf3a097f2ad3e97fbd2da8a29c350c
                                                                                                            • Instruction Fuzzy Hash: 2C515BB0E042198FDB14CFA9D5806AEBBB2FF89304F24D169D418AB316D7319942CFA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.1709732768.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_5e40000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a33cf459dd36a293f6d7265e72ea5799b5a898015976e58bf353ebc318685c76
                                                                                                            • Instruction ID: b1facba59e548370f687a9aec45802a661abd1144427af535cec541d3d0d11c9
                                                                                                            • Opcode Fuzzy Hash: a33cf459dd36a293f6d7265e72ea5799b5a898015976e58bf353ebc318685c76
                                                                                                            • Instruction Fuzzy Hash: B2512A74E042198BDB14CFA9D580AAEFBF6FF89305F24D169D418AB355D730A942CFA0

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:11.7%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:0%
                                                                                                            Total number of Nodes:17
                                                                                                            Total number of Limit Nodes:4
                                                                                                            execution_graph 23660 30f0848 23661 30f0849 23660->23661 23662 30f091b 23661->23662 23664 30f1380 23661->23664 23666 30f1396 23664->23666 23665 30f1480 23665->23661 23666->23665 23668 30f7eb0 23666->23668 23669 30f7eba 23668->23669 23670 30f7ed4 23669->23670 23673 6e5fa09 23669->23673 23677 6e5fa18 23669->23677 23670->23666 23675 6e5fa18 23673->23675 23674 6e5fc42 23674->23670 23675->23674 23676 6e5fc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 23675->23676 23676->23675 23678 6e5fa2d 23677->23678 23679 6e5fc42 23678->23679 23680 6e5fc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 23678->23680 23679->23670 23680->23678

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 6e53040-6e53061 1 6e53063-6e53066 0->1 2 6e53807-6e5380a 1->2 3 6e5306c-6e5308b 1->3 4 6e53830-6e53832 2->4 5 6e5380c-6e5382b 2->5 12 6e530a4-6e530ae 3->12 13 6e5308d-6e53090 3->13 6 6e53834 4->6 7 6e53839-6e5383c 4->7 5->4 6->7 7->1 9 6e53842-6e5384b 7->9 17 6e530b4-6e530c3 12->17 13->12 15 6e53092-6e530a2 13->15 15->17 126 6e530c5 call 6e53860 17->126 127 6e530c5 call 6e53859 17->127 19 6e530ca-6e530cf 20 6e530d1-6e530d7 19->20 21 6e530dc-6e533b9 19->21 20->9 42 6e533bf-6e5346e 21->42 43 6e537f9-6e53806 21->43 52 6e53497 42->52 53 6e53470-6e53495 42->53 55 6e534a0-6e534b3 52->55 53->55 57 6e537e0-6e537ec 55->57 58 6e534b9-6e534db 55->58 57->42 59 6e537f2 57->59 58->57 61 6e534e1-6e534eb 58->61 59->43 61->57 62 6e534f1-6e534fc 61->62 62->57 63 6e53502-6e535d8 62->63 75 6e535e6-6e53616 63->75 76 6e535da-6e535dc 63->76 80 6e53624-6e53630 75->80 81 6e53618-6e5361a 75->81 76->75 82 6e53690-6e53694 80->82 83 6e53632-6e53636 80->83 81->80 85 6e537d1-6e537da 82->85 86 6e5369a-6e536d6 82->86 83->82 84 6e53638-6e53662 83->84 93 6e53664-6e53666 84->93 94 6e53670-6e5368d 84->94 85->57 85->63 96 6e536e4-6e536f2 86->96 97 6e536d8-6e536da 86->97 93->94 94->82 100 6e536f4-6e536ff 96->100 101 6e53709-6e53714 96->101 97->96 100->101 104 6e53701 100->104 105 6e53716-6e5371c 101->105 106 6e5372c-6e5373d 101->106 104->101 107 6e53720-6e53722 105->107 108 6e5371e 105->108 110 6e53755-6e53761 106->110 111 6e5373f-6e53745 106->111 107->106 108->106 115 6e53763-6e53769 110->115 116 6e53779-6e537ca 110->116 112 6e53747 111->112 113 6e53749-6e5374b 111->113 112->110 113->110 117 6e5376d-6e5376f 115->117 118 6e5376b 115->118 116->85 117->116 118->116 126->19 127->19
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1582559945
                                                                                                            • Opcode ID: 1dc513288e9c81414277c50ae2a3925ce2f3d4afcfc04d265b9d20c60fbe5dd2
                                                                                                            • Instruction ID: 9fb29b8c7cb908f0a3991e7c46206f60357fda389a9cb905f4a1935d4b3c63b1
                                                                                                            • Opcode Fuzzy Hash: 1dc513288e9c81414277c50ae2a3925ce2f3d4afcfc04d265b9d20c60fbe5dd2
                                                                                                            • Instruction Fuzzy Hash: DF321D35E1071ACFCB14DF75C89059EB7B2BFC9340F61969AD409AB264EB30AD85CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 671 6e57d68-6e57d86 672 6e57d88-6e57d8b 671->672 673 6e57da2-6e57da5 672->673 674 6e57d8d-6e57d9b 672->674 675 6e57da7-6e57dc1 673->675 676 6e57dc6-6e57dc9 673->676 683 6e57d9d 674->683 684 6e57e0e-6e57e24 674->684 675->676 677 6e57dd6-6e57dd9 676->677 678 6e57dcb-6e57dd5 676->678 681 6e57dfc-6e57dfe 677->681 682 6e57ddb-6e57df7 677->682 685 6e57e05-6e57e08 681->685 686 6e57e00 681->686 682->681 683->673 690 6e5803f-6e58049 684->690 691 6e57e2a-6e57e33 684->691 685->672 685->684 686->685 692 6e57e39-6e57e56 691->692 693 6e5804a-6e5807f 691->693 703 6e5802c-6e58039 692->703 704 6e57e5c-6e57e84 692->704 697 6e58081-6e58084 693->697 699 6e580a7-6e580aa 697->699 700 6e58086-6e580a2 697->700 701 6e580b0-6e580bf 699->701 702 6e582df-6e582e2 699->702 700->699 713 6e580c1-6e580dc 701->713 714 6e580de-6e58122 701->714 705 6e5838d-6e5838f 702->705 706 6e582e8-6e582f4 702->706 703->690 703->691 704->703 726 6e57e8a-6e57e93 704->726 709 6e58396-6e58399 705->709 710 6e58391 705->710 715 6e582ff-6e58301 706->715 709->697 716 6e5839f-6e583a8 709->716 710->709 713->714 729 6e582b3-6e582c9 714->729 730 6e58128-6e58139 714->730 717 6e58303-6e58309 715->717 718 6e58319-6e5831d 715->718 721 6e5830d-6e5830f 717->721 722 6e5830b 717->722 723 6e5831f-6e58329 718->723 724 6e5832b 718->724 721->718 722->718 728 6e58330-6e58332 723->728 724->728 726->693 727 6e57e99-6e57eb5 726->727 740 6e57ebb-6e57ee5 727->740 741 6e5801a-6e58026 727->741 733 6e58334-6e58337 728->733 734 6e58343-6e5837c 728->734 729->702 738 6e5813f-6e5815c 730->738 739 6e5829e-6e582ad 730->739 733->716 734->701 753 6e58382-6e5838c 734->753 738->739 750 6e58162-6e58258 call 6e56590 738->750 739->729 739->730 755 6e58010-6e58015 740->755 756 6e57eeb-6e57f13 740->756 741->703 741->726 804 6e58266 750->804 805 6e5825a-6e58264 750->805 755->741 756->755 762 6e57f19-6e57f47 756->762 762->755 768 6e57f4d-6e57f56 762->768 768->755 769 6e57f5c-6e57f8e 768->769 777 6e57f90-6e57f94 769->777 778 6e57f99-6e57fb5 769->778 777->755 779 6e57f96 777->779 778->741 780 6e57fb7-6e5800e call 6e56590 778->780 779->778 780->741 806 6e5826b-6e5826d 804->806 805->806 806->739 807 6e5826f-6e58274 806->807 808 6e58276-6e58280 807->808 809 6e58282 807->809 810 6e58287-6e58289 808->810 809->810 810->739 811 6e5828b-6e58297 810->811 811->739
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq
                                                                                                            • API String ID: 0-2537786760
                                                                                                            • Opcode ID: 9d4f0809bb51254125d1a352bbe88ce4a55396d8fa1e7f13e3e90f3a5a20e597
                                                                                                            • Instruction ID: 3149f6fcdbcde3b25174fdc23204680e3cffb262cb4c480256458a5b5f840925
                                                                                                            • Opcode Fuzzy Hash: 9d4f0809bb51254125d1a352bbe88ce4a55396d8fa1e7f13e3e90f3a5a20e597
                                                                                                            • Instruction Fuzzy Hash: 1302AE30B002168FDB54DB69D9906AFB7B2FF84314F159929D805DB394EB35EC82CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4b5770f2ce616999e62edc6fc545108207fe8500251980a54ff932f6403db19a
                                                                                                            • Instruction ID: 2f2e7493c558cf90ea5c07521e6f0a5cb1b5a059c5f5cb5ead9210c736379aad
                                                                                                            • Opcode Fuzzy Hash: 4b5770f2ce616999e62edc6fc545108207fe8500251980a54ff932f6403db19a
                                                                                                            • Instruction Fuzzy Hash: 21925634A003048FDBA4CB68C584B5DB7F2FF49318F5694A9E909AB365DB35ED81CB80
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5a13c1ae85697520314da3de957eeb3712c792439e37a2bc6f2a6a702b135b59
                                                                                                            • Instruction ID: dd454172987781fb3a6ce86671bef0dc17976786699a122d5e5d757d0affc7ec
                                                                                                            • Opcode Fuzzy Hash: 5a13c1ae85697520314da3de957eeb3712c792439e37a2bc6f2a6a702b135b59
                                                                                                            • Instruction Fuzzy Hash: AA629F34B003058FDB54DB68D584AAEB7F2EF88314F659469E806DB364DB35ED82CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 599d794bec650adf87f631707e48bf333e2e20976b865330093a53905d4b882d
                                                                                                            • Instruction ID: 5485776ea857eb663ed0720c5497b096f6e9cc497fe6e9f230842e74d866fd16
                                                                                                            • Opcode Fuzzy Hash: 599d794bec650adf87f631707e48bf333e2e20976b865330093a53905d4b882d
                                                                                                            • Instruction Fuzzy Hash: 6122D271E003158FDF60CBA8C5806AEBBB2EF85324F268469D855EB394DB35DC41CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1575d735c9ba18fc75e3cc23ad77676fff4c3ed03095f687b456e68a4a8776cb
                                                                                                            • Instruction ID: 33c04f78b8b8e5d0260bb774eb8fbaefc0047f85a0d202f1be53ed1ca2b6e526
                                                                                                            • Opcode Fuzzy Hash: 1575d735c9ba18fc75e3cc23ad77676fff4c3ed03095f687b456e68a4a8776cb
                                                                                                            • Instruction Fuzzy Hash: D0229170E102098FDF64CBA9D5A47AEB7B2FB45314F219526E805EB391DB34DC81CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 128 6e5b630-6e5b650 129 6e5b652-6e5b655 128->129 130 6e5b657-6e5b65e 129->130 131 6e5b66f-6e5b672 129->131 132 6e5b664-6e5b66a 130->132 133 6e5b9d3-6e5ba0e 130->133 134 6e5b674-6e5b67d 131->134 135 6e5b682-6e5b685 131->135 132->131 143 6e5ba10-6e5ba13 133->143 134->135 136 6e5b687-6e5b689 135->136 137 6e5b68c-6e5b68f 135->137 136->137 139 6e5b691-6e5b697 137->139 140 6e5b69c-6e5b69f 137->140 139->140 141 6e5b6a5-6e5b6a8 140->141 142 6e5b770-6e5b771 140->142 144 6e5b6c5-6e5b6c8 141->144 145 6e5b6aa-6e5b6b3 141->145 148 6e5b776-6e5b779 142->148 146 6e5bc7f-6e5bc82 143->146 147 6e5ba19-6e5ba41 143->147 152 6e5b6d8-6e5b6db 144->152 153 6e5b6ca-6e5b6d3 144->153 145->133 149 6e5b6b9-6e5b6c0 145->149 150 6e5bca5-6e5bca7 146->150 151 6e5bc84-6e5bca0 146->151 201 6e5ba43-6e5ba46 147->201 202 6e5ba4b-6e5ba8f 147->202 154 6e5b7ce-6e5b7d1 148->154 155 6e5b77b-6e5b7c9 call 6e56590 148->155 149->144 159 6e5bcae-6e5bcb1 150->159 160 6e5bca9 150->160 151->150 157 6e5b6dd-6e5b6e6 152->157 158 6e5b6eb-6e5b6ee 152->158 153->152 161 6e5b810-6e5b813 154->161 162 6e5b7d3-6e5b7e8 154->162 155->154 157->158 166 6e5b6f0-6e5b6f6 158->166 167 6e5b708-6e5b70b 158->167 159->143 168 6e5bcb7-6e5bcc0 159->168 160->159 163 6e5b815-6e5b82a 161->163 164 6e5b852-6e5b855 161->164 162->133 187 6e5b7ee-6e5b80b 162->187 163->133 192 6e5b830-6e5b84d 163->192 172 6e5b857-6e5b85e 164->172 173 6e5b87f-6e5b882 164->173 166->133 171 6e5b6fc-6e5b703 166->171 174 6e5b70d-6e5b713 167->174 175 6e5b71a-6e5b71d 167->175 171->167 172->133 183 6e5b864-6e5b874 172->183 178 6e5b8a5-6e5b8a8 173->178 179 6e5b884-6e5b8a0 173->179 174->166 184 6e5b715 174->184 185 6e5b72f-6e5b732 175->185 186 6e5b71f-6e5b72a 175->186 190 6e5b8ca-6e5b8cd 178->190 191 6e5b8aa-6e5b8c5 178->191 179->178 209 6e5b947-6e5b94e 183->209 210 6e5b87a 183->210 184->175 188 6e5b734-6e5b73b 185->188 189 6e5b749-6e5b74c 185->189 186->185 187->161 188->133 198 6e5b741-6e5b744 188->198 199 6e5b756-6e5b759 189->199 200 6e5b74e-6e5b753 189->200 203 6e5b8d7-6e5b8da 190->203 204 6e5b8cf-6e5b8d2 190->204 191->190 192->164 198->189 206 6e5b766-6e5b769 199->206 207 6e5b75b-6e5b761 199->207 200->199 201->168 241 6e5ba95-6e5ba9e 202->241 242 6e5bc74-6e5bc7e 202->242 212 6e5b8dc-6e5b8df 203->212 213 6e5b92e-6e5b937 203->213 204->203 206->174 216 6e5b76b-6e5b76e 206->216 207->206 209->133 218 6e5b954-6e5b964 209->218 210->173 220 6e5b8e1-6e5b8e5 212->220 221 6e5b8f0-6e5b8f3 212->221 213->145 217 6e5b93d 213->217 216->142 216->148 225 6e5b942-6e5b945 217->225 218->142 234 6e5b96a 218->234 220->157 222 6e5b8eb 220->222 223 6e5b8f5-6e5b8fe 221->223 224 6e5b903-6e5b906 221->224 222->221 223->224 224->142 227 6e5b90c-6e5b90f 224->227 225->209 229 6e5b96f-6e5b972 225->229 232 6e5b911-6e5b918 227->232 233 6e5b929-6e5b92c 227->233 235 6e5b984-6e5b987 229->235 236 6e5b974 229->236 232->133 239 6e5b91e-6e5b924 232->239 233->213 233->225 234->229 235->142 238 6e5b98d-6e5b990 235->238 243 6e5b97c-6e5b97f 236->243 244 6e5b9b6-6e5b9b8 238->244 245 6e5b992-6e5b999 238->245 239->233 246 6e5baa4-6e5bb10 call 6e56590 241->246 247 6e5bc6a-6e5bc6f 241->247 243->235 250 6e5b9bf-6e5b9c2 244->250 251 6e5b9ba 244->251 245->133 248 6e5b99b-6e5b9ab 245->248 262 6e5bb16-6e5bb1b 246->262 263 6e5bc0a-6e5bc1f 246->263 247->242 248->172 256 6e5b9b1 248->256 250->129 252 6e5b9c8-6e5b9d2 250->252 251->250 256->244 265 6e5bb37 262->265 266 6e5bb1d-6e5bb23 262->266 263->247 269 6e5bb39-6e5bb3f 265->269 267 6e5bb25-6e5bb27 266->267 268 6e5bb29-6e5bb2b 266->268 270 6e5bb35 267->270 268->270 271 6e5bb54-6e5bb61 269->271 272 6e5bb41-6e5bb47 269->272 270->269 279 6e5bb63-6e5bb69 271->279 280 6e5bb79-6e5bb86 271->280 273 6e5bbf5-6e5bc04 272->273 274 6e5bb4d 272->274 273->262 273->263 274->271 275 6e5bbbc-6e5bbc9 274->275 276 6e5bb88-6e5bb95 274->276 288 6e5bbe1-6e5bbee 275->288 289 6e5bbcb-6e5bbd1 275->289 286 6e5bb97-6e5bb9d 276->286 287 6e5bbad-6e5bbba 276->287 282 6e5bb6d-6e5bb6f 279->282 283 6e5bb6b 279->283 280->273 282->280 283->280 292 6e5bba1-6e5bba3 286->292 293 6e5bb9f 286->293 287->273 288->273 290 6e5bbd5-6e5bbd7 289->290 291 6e5bbd3 289->291 290->288 291->288 292->287 293->287
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1582559945
                                                                                                            • Opcode ID: 0c7f6a18a3dba93a745ea220ece08ceac37cff688cc5efd2509ce1d6becb0568
                                                                                                            • Instruction ID: a91552f023ef6097c6e356f79154b13d10150935e11230fb193a95851a7138a8
                                                                                                            • Opcode Fuzzy Hash: 0c7f6a18a3dba93a745ea220ece08ceac37cff688cc5efd2509ce1d6becb0568
                                                                                                            • Instruction Fuzzy Hash: 4502A030E103098FDBA4CF68D5A06AEB7B2FB45314F22956AE805DB395DB74DC81CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 296 6e59138-6e5915d 297 6e5915f-6e59162 296->297 298 6e59a20-6e59a23 297->298 299 6e59168-6e5917d 297->299 300 6e59a25-6e59a44 298->300 301 6e59a49-6e59a4b 298->301 306 6e59195-6e591ab 299->306 307 6e5917f-6e59185 299->307 300->301 303 6e59a52-6e59a55 301->303 304 6e59a4d 301->304 303->297 308 6e59a5b-6e59a65 303->308 304->303 313 6e591b6-6e591b8 306->313 309 6e59187 307->309 310 6e59189-6e5918b 307->310 309->306 310->306 314 6e591d0-6e59241 313->314 315 6e591ba-6e591c0 313->315 326 6e59243-6e59266 314->326 327 6e5926d-6e59289 314->327 316 6e591c4-6e591c6 315->316 317 6e591c2 315->317 316->314 317->314 326->327 332 6e592b5-6e592d0 327->332 333 6e5928b-6e592ae 327->333 338 6e592d2-6e592f4 332->338 339 6e592fb-6e59316 332->339 333->332 338->339 344 6e59318-6e59334 339->344 345 6e5933b-6e59349 339->345 344->345 346 6e59359-6e593d3 345->346 347 6e5934b-6e59354 345->347 353 6e593d5-6e593f3 346->353 354 6e59420-6e59435 346->354 347->308 358 6e593f5-6e59404 353->358 359 6e5940f-6e5941e 353->359 354->298 358->359 359->353 359->354
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-2113499236
                                                                                                            • Opcode ID: 158f3074c07506c41a5603ff1be9d96c6a5fff3cbe5b2db5519a1b6fd589711a
                                                                                                            • Instruction ID: 9454d7acf0f6951e1da5e7d62d9e790bc2c1231f1615363abc0b37c5310487ee
                                                                                                            • Opcode Fuzzy Hash: 158f3074c07506c41a5603ff1be9d96c6a5fff3cbe5b2db5519a1b6fd589711a
                                                                                                            • Instruction Fuzzy Hash: 53912130F0021A8FDB54DF65D9A07AFB3B6FB85200F118569D809EB359EF349D868B91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 362 6e5cf28-6e5cf43 363 6e5cf45-6e5cf48 362->363 364 6e5cf91-6e5cf94 363->364 365 6e5cf4a-6e5cf8c 363->365 366 6e5d414-6e5d420 364->366 367 6e5cf9a-6e5cf9d 364->367 365->364 371 6e5d426-6e5d713 366->371 372 6e5d122-6e5d131 366->372 368 6e5cfe6-6e5cfe9 367->368 369 6e5cf9f-6e5cfae 367->369 375 6e5d032-6e5d035 368->375 376 6e5cfeb-6e5d02d 368->376 373 6e5cfb0-6e5cfb5 369->373 374 6e5cfbd-6e5cfc9 369->374 575 6e5d719-6e5d71f 371->575 576 6e5d93a-6e5d944 371->576 377 6e5d140-6e5d14c 372->377 378 6e5d133-6e5d138 372->378 373->374 380 6e5d945-6e5d97e 374->380 381 6e5cfcf-6e5cfe1 374->381 382 6e5d037-6e5d079 375->382 383 6e5d07e-6e5d081 375->383 376->375 377->380 385 6e5d152-6e5d164 377->385 378->377 402 6e5d980-6e5d983 380->402 381->368 382->383 386 6e5d0a4-6e5d0a7 383->386 387 6e5d083-6e5d09f 383->387 397 6e5d169-6e5d16c 385->397 391 6e5d0f0-6e5d0f3 386->391 392 6e5d0a9-6e5d0eb 386->392 387->386 399 6e5d0f5-6e5d0fa 391->399 400 6e5d0fd-6e5d100 391->400 392->391 405 6e5d16e-6e5d170 397->405 406 6e5d17b-6e5d17e 397->406 399->400 407 6e5d102-6e5d118 400->407 408 6e5d11d-6e5d120 400->408 403 6e5d985-6e5d9a1 402->403 404 6e5d9a6-6e5d9a9 402->404 403->404 418 6e5d9b8-6e5d9bb 404->418 419 6e5d9ab call 6e5da9d 404->419 413 6e5d176 405->413 414 6e5d411 405->414 416 6e5d1c7-6e5d1ca 406->416 417 6e5d180-6e5d1c2 406->417 407->408 408->372 408->397 413->406 414->366 421 6e5d213-6e5d216 416->421 422 6e5d1cc-6e5d20e 416->422 417->416 426 6e5d9bd-6e5d9e9 418->426 427 6e5d9ee-6e5d9f0 418->427 432 6e5d9b1-6e5d9b3 419->432 435 6e5d225-6e5d228 421->435 436 6e5d218-6e5d21a 421->436 422->421 426->427 433 6e5d9f7-6e5d9fa 427->433 434 6e5d9f2 427->434 432->418 433->402 443 6e5d9fc-6e5da0b 433->443 434->433 446 6e5d271-6e5d274 435->446 447 6e5d22a-6e5d26c 435->447 444 6e5d220 436->444 445 6e5d2cf-6e5d2d8 436->445 465 6e5da72-6e5da87 443->465 466 6e5da0d-6e5da70 call 6e56590 443->466 444->435 450 6e5d2e7-6e5d2f3 445->450 451 6e5d2da-6e5d2df 445->451 453 6e5d276-6e5d2b8 446->453 454 6e5d2bd-6e5d2bf 446->454 447->446 459 6e5d404-6e5d409 450->459 460 6e5d2f9-6e5d30d 450->460 451->450 453->454 456 6e5d2c6-6e5d2c9 454->456 457 6e5d2c1 454->457 456->363 456->445 457->456 459->414 460->414 477 6e5d313-6e5d325 460->477 480 6e5da88 465->480 466->465 491 6e5d327-6e5d32d 477->491 492 6e5d349-6e5d34b 477->492 480->480 495 6e5d331-6e5d33d 491->495 496 6e5d32f 491->496 501 6e5d355-6e5d361 492->501 499 6e5d33f-6e5d347 495->499 496->499 499->501 508 6e5d363-6e5d36d 501->508 509 6e5d36f 501->509 511 6e5d374-6e5d376 508->511 509->511 511->414 513 6e5d37c-6e5d398 call 6e56590 511->513 522 6e5d3a7-6e5d3b3 513->522 523 6e5d39a-6e5d39f 513->523 522->459 525 6e5d3b5-6e5d402 522->525 523->522 525->414 577 6e5d721-6e5d726 575->577 578 6e5d72e-6e5d737 575->578 577->578 578->380 579 6e5d73d-6e5d750 578->579 581 6e5d756-6e5d75c 579->581 582 6e5d92a-6e5d934 579->582 583 6e5d75e-6e5d763 581->583 584 6e5d76b-6e5d774 581->584 582->575 582->576 583->584 584->380 585 6e5d77a-6e5d79b 584->585 588 6e5d79d-6e5d7a2 585->588 589 6e5d7aa-6e5d7b3 585->589 588->589 589->380 590 6e5d7b9-6e5d7d6 589->590 590->582 593 6e5d7dc-6e5d7e2 590->593 593->380 594 6e5d7e8-6e5d801 593->594 596 6e5d807-6e5d82e 594->596 597 6e5d91d-6e5d924 594->597 596->380 600 6e5d834-6e5d83e 596->600 597->582 597->593 600->380 601 6e5d844-6e5d85b 600->601 603 6e5d85d-6e5d868 601->603 604 6e5d86a-6e5d885 601->604 603->604 604->597 609 6e5d88b-6e5d8a4 call 6e56590 604->609 613 6e5d8a6-6e5d8ab 609->613 614 6e5d8b3-6e5d8bc 609->614 613->614 614->380 615 6e5d8c2-6e5d916 614->615 615->597
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq
                                                                                                            • API String ID: 0-837900676
                                                                                                            • Opcode ID: 8ee503e98f26aee039903a21b619a2020666aa52034da014919373d99dbd93dd
                                                                                                            • Instruction ID: a86f2d23ef53a5649bfb77178be883f679cb4c82168acb959172bf430848dcbe
                                                                                                            • Opcode Fuzzy Hash: 8ee503e98f26aee039903a21b619a2020666aa52034da014919373d99dbd93dd
                                                                                                            • Instruction Fuzzy Hash: D862A070A002068FCB55DF69DA90A5EB7F2FF84304F209A29D415AF365DB75EC86CB81

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 623 6e54b50-6e54b74 625 6e54b76-6e54b79 623->625 626 6e54b7f-6e54c77 625->626 627 6e55258-6e5525b 625->627 647 6e54c7d-6e54cca call 6e553f8 626->647 648 6e54cfa-6e54d01 626->648 628 6e5525d-6e55277 627->628 629 6e5527c-6e5527e 627->629 628->629 630 6e55285-6e55288 629->630 631 6e55280 629->631 630->625 634 6e5528e-6e5529b 630->634 631->630 661 6e54cd0-6e54cec 647->661 649 6e54d85-6e54d8e 648->649 650 6e54d07-6e54d77 648->650 649->634 667 6e54d82 650->667 668 6e54d79 650->668 664 6e54cf7-6e54cf8 661->664 665 6e54cee 661->665 664->648 665->664 667->649 668->667
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: fkq$XPkq$\Okq
                                                                                                            • API String ID: 0-673657909
                                                                                                            • Opcode ID: 0c40c68cdd0d6e43b6b5662b4897eb5caf7c466edf15a7e4cad5c7dde0e6af18
                                                                                                            • Instruction ID: 55655d00a9d0e86484b78b4c7b9fa4b2e27a9d5ec8e8edb3d209711377e0cff9
                                                                                                            • Opcode Fuzzy Hash: 0c40c68cdd0d6e43b6b5662b4897eb5caf7c466edf15a7e4cad5c7dde0e6af18
                                                                                                            • Instruction Fuzzy Hash: 2C616D70F002199FEB549FA9C8547AEBBF6FF88310F218129D506AB394DB758C45CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1141 6e59127-6e5915d 1143 6e5915f-6e59162 1141->1143 1144 6e59a20-6e59a23 1143->1144 1145 6e59168-6e5917d 1143->1145 1146 6e59a25-6e59a44 1144->1146 1147 6e59a49-6e59a4b 1144->1147 1152 6e59195-6e591ab 1145->1152 1153 6e5917f-6e59185 1145->1153 1146->1147 1149 6e59a52-6e59a55 1147->1149 1150 6e59a4d 1147->1150 1149->1143 1154 6e59a5b-6e59a65 1149->1154 1150->1149 1159 6e591b6-6e591b8 1152->1159 1155 6e59187 1153->1155 1156 6e59189-6e5918b 1153->1156 1155->1152 1156->1152 1160 6e591d0-6e59241 1159->1160 1161 6e591ba-6e591c0 1159->1161 1172 6e59243-6e59266 1160->1172 1173 6e5926d-6e59289 1160->1173 1162 6e591c4-6e591c6 1161->1162 1163 6e591c2 1161->1163 1162->1160 1163->1160 1172->1173 1178 6e592b5-6e592d0 1173->1178 1179 6e5928b-6e592ae 1173->1179 1184 6e592d2-6e592f4 1178->1184 1185 6e592fb-6e59316 1178->1185 1179->1178 1184->1185 1190 6e59318-6e59334 1185->1190 1191 6e5933b-6e59349 1185->1191 1190->1191 1192 6e59359-6e593d3 1191->1192 1193 6e5934b-6e59354 1191->1193 1199 6e593d5-6e593f3 1192->1199 1200 6e59420-6e59435 1192->1200 1193->1154 1204 6e593f5-6e59404 1199->1204 1205 6e5940f-6e5941e 1199->1205 1200->1144 1204->1205 1205->1199 1205->1200
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq
                                                                                                            • API String ID: 0-2537786760
                                                                                                            • Opcode ID: 8cc6100218dbc1d2d8696f94baef0dd81b66f33f71df14e4e0ce3c78b0dfb51a
                                                                                                            • Instruction ID: 5e4598d520bd2e5f0f526a773751215c69d68258fa6666579607ebf98d4003bb
                                                                                                            • Opcode Fuzzy Hash: 8cc6100218dbc1d2d8696f94baef0dd81b66f33f71df14e4e0ce3c78b0dfb51a
                                                                                                            • Instruction Fuzzy Hash: 6E514334B002169FDB54DB75D9A0BAF73F6FB89240F148469C809DB399EA34DC42CB95

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1208 30feb38-30feb40 1209 30feaff-30feb18 call 30feb38 1208->1209 1210 30feb42-30feb53 1208->1210 1214 30feb1e-30feb22 1209->1214 1212 30feb7d-30feb93 1210->1212 1213 30feb55-30feb7c 1210->1213 1239 30feb95 call 30feb38 1212->1239 1240 30feb95 call 30fec20 1212->1240 1217 30feb2b-30feb2e 1214->1217 1218 30feb24-30feb29 1214->1218 1219 30feb31-30feb33 1217->1219 1218->1219 1220 30feb9a-30feb9c 1221 30feb9e-30feba1 1220->1221 1222 30feba2-30fec01 1220->1222 1229 30fec07-30fec94 GlobalMemoryStatusEx 1222->1229 1230 30fec03-30fec06 1222->1230 1234 30fec9d-30fecc5 1229->1234 1235 30fec96-30fec9c 1229->1235 1235->1234 1239->1220 1240->1220
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2924261739.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_30f0000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2fad560ef52e4984f0eeed3d2a51e6c17d6b432c164a828ce73f6339acb667d3
                                                                                                            • Instruction ID: cd54284f79c616752fefcb582dc6335b3f781b84b84ad3cf983dfbb8936a5ff6
                                                                                                            • Opcode Fuzzy Hash: 2fad560ef52e4984f0eeed3d2a51e6c17d6b432c164a828ce73f6339acb667d3
                                                                                                            • Instruction Fuzzy Hash: B6517672D0139A8FCB14DF69D8006DEBBF5EF89320F1885ABD945A7351DB389841CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1241 30fec20-30fec94 GlobalMemoryStatusEx 1243 30fec9d-30fecc5 1241->1243 1244 30fec96-30fec9c 1241->1244 1244->1243
                                                                                                            APIs
                                                                                                            • GlobalMemoryStatusEx.KERNELBASE ref: 030FEC87
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2924261739.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_30f0000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: GlobalMemoryStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 1890195054-0
                                                                                                            • Opcode ID: ccc5317d6f9a55865f5438d3b721a8a977d22233ae3982509d0624f4677de505
                                                                                                            • Instruction ID: b1746d9893ee3b3014605e75624b28341be25b4b1f4542c373aef97d630363a7
                                                                                                            • Opcode Fuzzy Hash: ccc5317d6f9a55865f5438d3b721a8a977d22233ae3982509d0624f4677de505
                                                                                                            • Instruction Fuzzy Hash: 91111FB1C0065A9FCB10CF9AC545B9EFBF8AF48320F14816AE918A7240D378A940CFA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: XPkq
                                                                                                            • API String ID: 0-3796509991
                                                                                                            • Opcode ID: bedfec22f938974d4474382a708149180d85b2c273610c539948fb5899336a7c
                                                                                                            • Instruction ID: 825c5fadc9799b8f123333c92eeedff6a0746d149fdb0b36ac900ac556b63e0c
                                                                                                            • Opcode Fuzzy Hash: bedfec22f938974d4474382a708149180d85b2c273610c539948fb5899336a7c
                                                                                                            • Instruction Fuzzy Hash: 3A417C70B002199FEB549FA9C854BAEBBF6FF88300F218529D505AB395DB748C45CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: 709a8cdcc6ed4f05e0d9889de76a92a92d75cc439127cd8babe7e99ff5b31ade
                                                                                                            • Instruction ID: 4e88e1381dff111bc782254682487dc52d5622614019d8bf83fbfed2d47ef769
                                                                                                            • Opcode Fuzzy Hash: 709a8cdcc6ed4f05e0d9889de76a92a92d75cc439127cd8babe7e99ff5b31ade
                                                                                                            • Instruction Fuzzy Hash: 4D419170E0030A9FDB65DF65C8906AEBBB3EF85314F218529E806EB344DB759D42CB94
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: 9aed50351f43c2cf8c081bec46be5a34b3d151249cddbecb569317b5f8fee30a
                                                                                                            • Instruction ID: 9073726ca13019d00789fecef6f976ffe613396f9ae61fc65537e6066db294a4
                                                                                                            • Opcode Fuzzy Hash: 9aed50351f43c2cf8c081bec46be5a34b3d151249cddbecb569317b5f8fee30a
                                                                                                            • Instruction Fuzzy Hash: 56311E34B002068FDF599B74C55466F3BA3AF8A214F209428E902EB384EF35DD42C7E1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq
                                                                                                            • API String ID: 0-12477121
                                                                                                            • Opcode ID: af0050d75d261ccd88337374cd8ac2f157bc35a794595f7115173d0f17bf0ec6
                                                                                                            • Instruction ID: 665e74491029696136ff4ae223e27f8f5dbdcb34faa78199e1c0b053110d779e
                                                                                                            • Opcode Fuzzy Hash: af0050d75d261ccd88337374cd8ac2f157bc35a794595f7115173d0f17bf0ec6
                                                                                                            • Instruction Fuzzy Hash: 80F0ED3AF04320CFEF688E42EA882BB73A4EB04258F1621A2CE00C3150D735CA41CA91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1e9a6cf52484b274033894770bfcad887c2583b79e0ba87cef7897d465d3fcc8
                                                                                                            • Instruction ID: 5afc2920fe4732f806ef6e1454602d9d51493871bc2047669c60836771e5a8a1
                                                                                                            • Opcode Fuzzy Hash: 1e9a6cf52484b274033894770bfcad887c2583b79e0ba87cef7897d465d3fcc8
                                                                                                            • Instruction Fuzzy Hash: A832A234B003098FDB54DF68D990AAEB7B2FB88714F219529D905EB355DB34EC82CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d743241439cf98fabb99f7f8c000e3b28287d81ce6e2d5c39e90c9ae7fa5079d
                                                                                                            • Instruction ID: 8c86b475231f75266821113ab88589288d1d30f1ccf6fe7a87dcae17505c2e07
                                                                                                            • Opcode Fuzzy Hash: d743241439cf98fabb99f7f8c000e3b28287d81ce6e2d5c39e90c9ae7fa5079d
                                                                                                            • Instruction Fuzzy Hash: C261AF72F002224BDB549A6ECC8056FEAEBAFC4224B554439D80EDB374DE66EC4287C1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a20a0a0cdf128d23eb388cba4608e5fd032a223c3280358b559271b314117e18
                                                                                                            • Instruction ID: 09073000a0ff1119fd78f893e25db0cbd06f12a31b7d4d820192fa2235ba19f7
                                                                                                            • Opcode Fuzzy Hash: a20a0a0cdf128d23eb388cba4608e5fd032a223c3280358b559271b314117e18
                                                                                                            • Instruction Fuzzy Hash: 2E814130B0020A9BDF54DFA9D55475EB7F6EF85314F118529D80AEB398EB34DC828791
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 46b93572b5ceaa6606eb089f82ad59c90410c1df62a0a59243adce792b61865a
                                                                                                            • Instruction ID: 85003a8cb82498d135f03621232b577758c4b48246b447db31911502463bbd69
                                                                                                            • Opcode Fuzzy Hash: 46b93572b5ceaa6606eb089f82ad59c90410c1df62a0a59243adce792b61865a
                                                                                                            • Instruction Fuzzy Hash: 49916F34E003198FDF60CF64C890B9DB7B1FF89304F218699D549AB291DB70AA85CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8f9e7800dd5b92c5dbc48cdf928a41e738b24e7b1b86a282abbbc4cb037c2deb
                                                                                                            • Instruction ID: 6576dc4163c31cb63bef37f8da8f160bbaf8dfc72c94d5762ab37ab3092dac71
                                                                                                            • Opcode Fuzzy Hash: 8f9e7800dd5b92c5dbc48cdf928a41e738b24e7b1b86a282abbbc4cb037c2deb
                                                                                                            • Instruction Fuzzy Hash: C3719130E1031A8FCF55DFA9D9906AEB7B2FF85304F119929E805AB354DF74A846CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6db703c59483009af495ee7a2f7fdabe6f77078ddac39df67407ba2b7e15e54e
                                                                                                            • Instruction ID: 29fcd6a6e248c6d5b11ecfceec7b54fc7138f33e68914e2e58a5df592652bb9c
                                                                                                            • Opcode Fuzzy Hash: 6db703c59483009af495ee7a2f7fdabe6f77078ddac39df67407ba2b7e15e54e
                                                                                                            • Instruction Fuzzy Hash: AD915E74E006198BDF60DF68C880B9DB7B1FF89304F208699D509BB394DB70AA85CF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 369f49fdfe689d0fd8c1bbda628939c0d66df9f85d220ca4cd930282c4c228b2
                                                                                                            • Instruction ID: 2da5e65a5400dff0597da47ead6d5e6e71ee882f1f25523e473aaeee27fea328
                                                                                                            • Opcode Fuzzy Hash: 369f49fdfe689d0fd8c1bbda628939c0d66df9f85d220ca4cd930282c4c228b2
                                                                                                            • Instruction Fuzzy Hash: 31814970A002099FDB54DFA9D980A9EBBF6FF88304F259529E805EB355DB30ED46CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8e09fcc0ce19846735c60c8ced5fbebade65224cb487c13f0bbf2d0535b12037
                                                                                                            • Instruction ID: 13d0036868dcfdccfcb77a48b70e03a23264e67e6e31d8e7d6c478c6c7ecac45
                                                                                                            • Opcode Fuzzy Hash: 8e09fcc0ce19846735c60c8ced5fbebade65224cb487c13f0bbf2d0535b12037
                                                                                                            • Instruction Fuzzy Hash: F6714870A002098FDB54DFA9D980A9EBBF6FF88304F259529E805EB355DB30ED46CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c14dbcb6756d7c8ac191c2b20869c1f7f4d1cc02c8ff28b43b949fb10722708f
                                                                                                            • Instruction ID: 7a3eabbf0defc52dd3212b661931b34e922d746cc2d72f1b4ab97a489e70e0ee
                                                                                                            • Opcode Fuzzy Hash: c14dbcb6756d7c8ac191c2b20869c1f7f4d1cc02c8ff28b43b949fb10722708f
                                                                                                            • Instruction Fuzzy Hash: 8751E331E00209DFCB54ABB8E5546ADBBB2FB88325F11887AE906DB350DF359945CF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 871558d19849fcb50484a18c778f25c751207d2575e6915e1f3a681996611bb8
                                                                                                            • Instruction ID: 6f19214bb1bf886894cf158d4c97bb16d6bbfa081a01216abb60e894085b7876
                                                                                                            • Opcode Fuzzy Hash: 871558d19849fcb50484a18c778f25c751207d2575e6915e1f3a681996611bb8
                                                                                                            • Instruction Fuzzy Hash: FC51D770F203158BEF6457BCD9A476F365AD789314F20542AEA0AC73A5CE28CC81D7A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7c24242b3e80d5b22bff17a0bad8f1e127454f5c975a4b2e4925e6fb6cc450a5
                                                                                                            • Instruction ID: 04bb3162ec1e58f88f5ef903b3a3b5b2ba020a7ae12879d0ec1c53662eadc497
                                                                                                            • Opcode Fuzzy Hash: 7c24242b3e80d5b22bff17a0bad8f1e127454f5c975a4b2e4925e6fb6cc450a5
                                                                                                            • Instruction Fuzzy Hash: 4B51A870F203158BEFA457FCD9A472F265AD789354F205429DA0AC73E5CE68CC8197A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bffe7434c605a900738fc11beb9d85d8a809ec2f09a9be42de16f6e82c435198
                                                                                                            • Instruction ID: ff87ea7c0e08b5758b7c08daf89116d27658c072cad29c2db1b1fda10ca931da
                                                                                                            • Opcode Fuzzy Hash: bffe7434c605a900738fc11beb9d85d8a809ec2f09a9be42de16f6e82c435198
                                                                                                            • Instruction Fuzzy Hash: BF418B71E007099BCB70CEA9D880AAFFBB2FB85314F11492AE556D7650D330E95A8B91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9e9c791b6548f5a831fda08d0c2eb18fd09e2fee6d42e7a8bac0b70e3b73c7bc
                                                                                                            • Instruction ID: 50786881b8119addecbe2525fae5b91a379d54a49dd034bfa2181b948c2d8785
                                                                                                            • Opcode Fuzzy Hash: 9e9c791b6548f5a831fda08d0c2eb18fd09e2fee6d42e7a8bac0b70e3b73c7bc
                                                                                                            • Instruction Fuzzy Hash: A831A970E1031A8BDB25DF69C99069EBBB2FF85304F119929E805EB351EB71A942C780
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f24d92be5694c3d80eef15d5283be041a8e1bcefbd7aa46d6dc8527e3615bc52
                                                                                                            • Instruction ID: 83325b12f53a8c9541ab9ecbba663a02bdb7a0ec4a97c6a3d1374f67843ffa12
                                                                                                            • Opcode Fuzzy Hash: f24d92be5694c3d80eef15d5283be041a8e1bcefbd7aa46d6dc8527e3615bc52
                                                                                                            • Instruction Fuzzy Hash: C631A535E0020A9FDB19DF64DA5469EB7B2FF88310F11C529EA06E7350DB71AD46CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: eb19a0053fbed469dd170227d6cd135071003317f1c4bc50753570182a16117d
                                                                                                            • Instruction ID: 3b1cd2011b174136595729daf0bd4f760e8e9ec3875d69d3d35fbb0b34cccba2
                                                                                                            • Opcode Fuzzy Hash: eb19a0053fbed469dd170227d6cd135071003317f1c4bc50753570182a16117d
                                                                                                            • Instruction Fuzzy Hash: F9318F30E0020A9FCB59CF65DA9469EB7B2FF89310F11C529EA06E7350DB71AD86CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cf76e9707791b6f580276779bbb7f70fd211199f16249b5bd157b669682dd47b
                                                                                                            • Instruction ID: f6b5db6e6cc3cfdec9108cb7909491b1e0796b66a466d0cfdf8f8f1622b62513
                                                                                                            • Opcode Fuzzy Hash: cf76e9707791b6f580276779bbb7f70fd211199f16249b5bd157b669682dd47b
                                                                                                            • Instruction Fuzzy Hash: 2F219C35F01215AFEB40DFA9D981AEEBBF5EB48750F108026E905E7355E734DC418B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2506130f14e2d69649c4f1018fc07f4e7b9078df7147a3349f533c787fa46b42
                                                                                                            • Instruction ID: 54c48d28c6e022fc0fe3e3f25b32288dee789dc423bd27a64b931f5c8307d671
                                                                                                            • Opcode Fuzzy Hash: 2506130f14e2d69649c4f1018fc07f4e7b9078df7147a3349f533c787fa46b42
                                                                                                            • Instruction Fuzzy Hash: 86219A76F012159FDB80DFA9D981AAEB7F1FB48750F10802AE905E7355E734DC418B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2923712072.000000000176D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0176D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_176d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5655caa6c683c25d3162e6f4cb7d8388c6194598a096beab06d0ff2d13c36592
                                                                                                            • Instruction ID: f6fd122a274e1ab7c6e805655db75eb8b21e08e553667ef86fb37c35600e9d02
                                                                                                            • Opcode Fuzzy Hash: 5655caa6c683c25d3162e6f4cb7d8388c6194598a096beab06d0ff2d13c36592
                                                                                                            • Instruction Fuzzy Hash: 2D2125B1614204DFCB25DF58D9C0B26FB69FB84314F24C5ADDD894B252C336D447CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6b8efb7849a5a4839d29bdeb76102f02c7b23d4373c9e0dde145511388fd9f2d
                                                                                                            • Instruction ID: a4c747c4e0177beebe2dc9e2d8ecaf1ea4efe10081d01b877c6a779036da64c4
                                                                                                            • Opcode Fuzzy Hash: 6b8efb7849a5a4839d29bdeb76102f02c7b23d4373c9e0dde145511388fd9f2d
                                                                                                            • Instruction Fuzzy Hash: 7711A131B0412A9FDF949668D9546AF73FAEBC8250F014539D906EB358FE25DC428BD0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1504c890831e957460db58c82f9b07022f21a86210171bcee4e7ffff126d4189
                                                                                                            • Instruction ID: 08197c4a026c507396f36692e942027b98f666aa3e8c4c01e0c0206ebfba18da
                                                                                                            • Opcode Fuzzy Hash: 1504c890831e957460db58c82f9b07022f21a86210171bcee4e7ffff126d4189
                                                                                                            • Instruction Fuzzy Hash: 1621F2B1D01219AFCB00CF9AD985ACEFFB8FF49310F10852AE918A7240C375A944CFA5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1e795647b68d30f0aa9d30334850cc30850c8212f1f181f53bbbe9cae846ae1c
                                                                                                            • Instruction ID: 10815699e7ec7d970c4fac1ede500bee55e73ac323694044b818fa142fd29e05
                                                                                                            • Opcode Fuzzy Hash: 1e795647b68d30f0aa9d30334850cc30850c8212f1f181f53bbbe9cae846ae1c
                                                                                                            • Instruction Fuzzy Hash: 3E012834B042219FDB6196BCA55071BA7D6DBC9724F15883AE50AC7391DD29CD8283D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ddefd845765498502cbe9836da62dbad3f54bf8c2c69c84998dbf424b9e13319
                                                                                                            • Instruction ID: de1cf3ccadf7127b3d4b91c4389642ec864317ab88ec02931a1b5456a67a3b7c
                                                                                                            • Opcode Fuzzy Hash: ddefd845765498502cbe9836da62dbad3f54bf8c2c69c84998dbf424b9e13319
                                                                                                            • Instruction Fuzzy Hash: 3201D4B1B002205BDB66957CDA9072F67D6EB89624F158929F40AC7342DD14CC0747D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c30a05bc8f6eef143ef5b574bf5d356851def5ce0f4a5fa67b97fca65db3c647
                                                                                                            • Instruction ID: dbf14a39b16142c9a19e6b7f8166eb3a5c3834255c8b4e0ec91bef7160ff5f49
                                                                                                            • Opcode Fuzzy Hash: c30a05bc8f6eef143ef5b574bf5d356851def5ce0f4a5fa67b97fca65db3c647
                                                                                                            • Instruction Fuzzy Hash: 76014532B0452A9BCF949A69D8146AFB7FAEFC9250F15043AD846D3288FF208C068791
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2923712072.000000000176D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0176D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_176d000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction ID: fc978054b0d931b99ff343a97e2afd06bb7184ae428543aa2de81ac6ff174826
                                                                                                            • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction Fuzzy Hash: 7211BB75604284CFDB26CF58D5C0B15FBA2FB84314F28C6AADC894B656C33AD44ACB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5f99f868f0fc32c848e582efe34a24aaa8bdbc11447b6f7a362a2946187f7ea0
                                                                                                            • Instruction ID: 46590a968753e94b5b7b5772e8f26399b296902661fdfb275bf3c9b89e7af9a8
                                                                                                            • Opcode Fuzzy Hash: 5f99f868f0fc32c848e582efe34a24aaa8bdbc11447b6f7a362a2946187f7ea0
                                                                                                            • Instruction Fuzzy Hash: 1401D4B1B142014FC7A5DA7CE96471FBBE1EB8A618F21997AE54AC7390DE24DC42C380
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3435ab51670e9611fd0c17a2aceaae8f624cdccef00999754b86a09b5be978c8
                                                                                                            • Instruction ID: b14f945310ca94b40dc5be4dda7afc8ccecfcee7440484f2cbab3b92bd0c513f
                                                                                                            • Opcode Fuzzy Hash: 3435ab51670e9611fd0c17a2aceaae8f624cdccef00999754b86a09b5be978c8
                                                                                                            • Instruction Fuzzy Hash: B411D3B5D01219AFCB00CF9AD985BDEFFB8FB48310F10812AE918A7240D375A944CFA5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fc3d91aed3adb6c4d420c92ddec15edb6b023ee47a947f085fdfea1399cf1b81
                                                                                                            • Instruction ID: c3cb65dad3d8bd7277682761ff357aff0143bb848585e2a8af043f0a2f32df91
                                                                                                            • Opcode Fuzzy Hash: fc3d91aed3adb6c4d420c92ddec15edb6b023ee47a947f085fdfea1399cf1b81
                                                                                                            • Instruction Fuzzy Hash: 2B01D135B001229BDB6495ADA55072BE3DBEBC8724F11883DE50AC7390DD25DC824391
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fe344c3752b7f7abc04aacd67d976b0e03ef13ab92ee3d13b8755fa96622edcf
                                                                                                            • Instruction ID: d19de4b5c4e9e67ab51ec5bb0b91028ddd895fc6c3fdc9afb90738a2abcdeb6f
                                                                                                            • Opcode Fuzzy Hash: fe344c3752b7f7abc04aacd67d976b0e03ef13ab92ee3d13b8755fa96622edcf
                                                                                                            • Instruction Fuzzy Hash: B001AFB1B102155BDB65D67CDA9072FA3D6EBC9624F209839F90AC7341DE25DC034791
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 117c85225d8288934b78160872a43d0ca8c5992e86dca66d4dafc3c6356e9602
                                                                                                            • Instruction ID: f355d50ec9e3bf0a6ac1d036efcfda70cae433316a39675367903b08f336dd13
                                                                                                            • Opcode Fuzzy Hash: 117c85225d8288934b78160872a43d0ca8c5992e86dca66d4dafc3c6356e9602
                                                                                                            • Instruction Fuzzy Hash: F001A470B102155BDB65D67CE46472FB7D6EB89718F109939E90AC7350DD25DC428384
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2ef6c2375e25abb8f8b37ad7e526dfbbbb78de8e4f149f9dfb50214dbf352709
                                                                                                            • Instruction ID: b810fcfc01e1e4d9286d8fa2e26c645ffe8ea76a41231c2c1fcafdd17858e154
                                                                                                            • Opcode Fuzzy Hash: 2ef6c2375e25abb8f8b37ad7e526dfbbbb78de8e4f149f9dfb50214dbf352709
                                                                                                            • Instruction Fuzzy Hash: 72E09271E10308ABDBB0CE64C91435A77AAFB01318F6258A5DC44CB252E632D912C351
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1462074617
                                                                                                            • Opcode ID: dc1b689e8f14237f8a694bceb7e64188b01eaaab3ec8777aa63989f9b90d87e6
                                                                                                            • Instruction ID: ee5d244b1dbeaabc7759e32963b1a8ddaab1ad2a20038f5ec2f88fb1f7fb19d6
                                                                                                            • Opcode Fuzzy Hash: dc1b689e8f14237f8a694bceb7e64188b01eaaab3ec8777aa63989f9b90d87e6
                                                                                                            • Instruction Fuzzy Hash: 57122B34E013198FDF64DF69C984A9EB7B2BF88304F2195A9D809AB355DB309D81CF81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-3929485403
                                                                                                            • Opcode ID: 96a028a194ecffd416360dbdc3a7bc3fec3e066bebea81da75cb8ade8995b079
                                                                                                            • Instruction ID: 238a1262a7442ec58d799a3e5c29f30a041559f99a17061c1c148c5176e25133
                                                                                                            • Opcode Fuzzy Hash: 96a028a194ecffd416360dbdc3a7bc3fec3e066bebea81da75cb8ade8995b079
                                                                                                            • Instruction Fuzzy Hash: B0919270A00309DFEB64DF69DA847AE7BB6FF84304F119639E8019B295DB349C81CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: .5~q$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1301248726
                                                                                                            • Opcode ID: dd53866876977246fe77c1b0f6901a9e5d24550bddd8dd8e4b97bc051a57c507
                                                                                                            • Instruction ID: bfe4b1d01ee21847894ee904bb1dc79c4c8136e0ddb9df290b502281710feae1
                                                                                                            • Opcode Fuzzy Hash: dd53866876977246fe77c1b0f6901a9e5d24550bddd8dd8e4b97bc051a57c507
                                                                                                            • Instruction Fuzzy Hash: 81F16B34A11309CFDB54DFA9C594A6EB7B2FF84304F219568D8069B794CB35EC82CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-2113499236
                                                                                                            • Opcode ID: baf8cea26c4192323336ab900c4eecb274887d8d4b5185ce2c581a062ac6c6de
                                                                                                            • Instruction ID: 8d76fe3780ff4cd0189a3ddce867e943509639c67bc99290285244b138ff3766
                                                                                                            • Opcode Fuzzy Hash: baf8cea26c4192323336ab900c4eecb274887d8d4b5185ce2c581a062ac6c6de
                                                                                                            • Instruction Fuzzy Hash: 71B14A30A112198FDB54DBA9C5906AFB7B2FF84304F259529D806DB395DB74DC82CB81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2935503612.0000000006E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_6e50000_Overdue_payment.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: LRfq$LRfq$$fq$$fq
                                                                                                            • API String ID: 0-1810675050
                                                                                                            • Opcode ID: 903eb26f77870321711882ca3f1b8fe794c1c04653af1fb374f253472e6867b3
                                                                                                            • Instruction ID: 27e0d1f64ae3ee6e6949df380c020762d5d3d8d6f53cbdb9d38eef9ca9b334b6
                                                                                                            • Opcode Fuzzy Hash: 903eb26f77870321711882ca3f1b8fe794c1c04653af1fb374f253472e6867b3
                                                                                                            • Instruction Fuzzy Hash: B451B434B003119FDB58DB29D990A6BB7F6FF88304F15966CE8059B3A5DA34EC41CB91

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:11.4%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:0%
                                                                                                            Total number of Nodes:222
                                                                                                            Total number of Limit Nodes:13
                                                                                                            execution_graph 34197 6c993e8 34198 6c99573 34197->34198 34200 6c9940e 34197->34200 34200->34198 34201 6c93380 34200->34201 34202 6c99668 PostMessageW 34201->34202 34203 6c996d4 34202->34203 34203->34200 34183 96b0d0 34187 96b1b8 34183->34187 34192 96b1c8 34183->34192 34184 96b0df 34188 96b1fc 34187->34188 34189 96b1d9 34187->34189 34188->34184 34189->34188 34190 96b400 GetModuleHandleW 34189->34190 34191 96b42d 34190->34191 34191->34184 34193 96b1fc 34192->34193 34195 96b1d9 34192->34195 34193->34184 34194 96b400 GetModuleHandleW 34196 96b42d 34194->34196 34195->34193 34195->34194 34196->34184 34204 96d460 34205 96d4a6 GetCurrentProcess 34204->34205 34207 96d4f1 34205->34207 34208 96d4f8 GetCurrentThread 34205->34208 34207->34208 34209 96d535 GetCurrentProcess 34208->34209 34210 96d52e 34208->34210 34211 96d56b 34209->34211 34210->34209 34212 96d593 GetCurrentThreadId 34211->34212 34213 96d5c4 34212->34213 34214 6c96e32 34215 6c970d1 34214->34215 34216 6c96e3c 34214->34216 34217 6c97078 34215->34217 34221 6c98200 34215->34221 34243 6c98266 34215->34243 34266 6c981f0 34215->34266 34222 6c9821a 34221->34222 34288 6c98a32 34222->34288 34293 6c98b30 34222->34293 34298 6c98570 34222->34298 34304 6c98951 34222->34304 34309 6c988ff 34222->34309 34314 6c987bd 34222->34314 34319 6c98f3d 34222->34319 34324 6c987d9 34222->34324 34329 6c989e7 34222->34329 34337 6c988a0 34222->34337 34341 6c98a8e 34222->34341 34346 6c987cf 34222->34346 34351 6c9884c 34222->34351 34358 6c98c0d 34222->34358 34363 6c98a0b 34222->34363 34368 6c98fc8 34222->34368 34373 6c98da8 34222->34373 34378 6c98934 34222->34378 34383 6c98814 34222->34383 34223 6c98222 34223->34217 34244 6c981f4 34243->34244 34246 6c98269 34243->34246 34247 6c98da8 2 API calls 34244->34247 34248 6c98fc8 2 API calls 34244->34248 34249 6c98a0b 2 API calls 34244->34249 34250 6c98c0d 2 API calls 34244->34250 34251 6c9884c 5 API calls 34244->34251 34252 6c987cf 3 API calls 34244->34252 34253 6c98a8e 2 API calls 34244->34253 34254 6c988a0 2 API calls 34244->34254 34255 6c989e7 4 API calls 34244->34255 34256 6c987d9 3 API calls 34244->34256 34257 6c98f3d 3 API calls 34244->34257 34258 6c987bd 2 API calls 34244->34258 34259 6c988ff 2 API calls 34244->34259 34260 6c98951 2 API calls 34244->34260 34261 6c98570 2 API calls 34244->34261 34262 6c98b30 2 API calls 34244->34262 34263 6c98a32 3 API calls 34244->34263 34264 6c98814 3 API calls 34244->34264 34265 6c98934 2 API calls 34244->34265 34245 6c98222 34245->34217 34247->34245 34248->34245 34249->34245 34250->34245 34251->34245 34252->34245 34253->34245 34254->34245 34255->34245 34256->34245 34257->34245 34258->34245 34259->34245 34260->34245 34261->34245 34262->34245 34263->34245 34264->34245 34265->34245 34267 6c981f4 34266->34267 34269 6c98da8 2 API calls 34267->34269 34270 6c98fc8 2 API calls 34267->34270 34271 6c98a0b 2 API calls 34267->34271 34272 6c98c0d 2 API calls 34267->34272 34273 6c9884c 5 API calls 34267->34273 34274 6c987cf 3 API calls 34267->34274 34275 6c98a8e 2 API calls 34267->34275 34276 6c988a0 2 API calls 34267->34276 34277 6c989e7 4 API calls 34267->34277 34278 6c987d9 3 API calls 34267->34278 34279 6c98f3d 3 API calls 34267->34279 34280 6c987bd 2 API calls 34267->34280 34281 6c988ff 2 API calls 34267->34281 34282 6c98951 2 API calls 34267->34282 34283 6c98570 2 API calls 34267->34283 34284 6c98b30 2 API calls 34267->34284 34285 6c98a32 3 API calls 34267->34285 34286 6c98814 3 API calls 34267->34286 34287 6c98934 2 API calls 34267->34287 34268 6c98222 34268->34217 34269->34268 34270->34268 34271->34268 34272->34268 34273->34268 34274->34268 34275->34268 34276->34268 34277->34268 34278->34268 34279->34268 34280->34268 34281->34268 34282->34268 34283->34268 34284->34268 34285->34268 34286->34268 34287->34268 34289 6c987c5 34288->34289 34388 6c960f8 34289->34388 34392 6c96197 34289->34392 34397 6c960f0 34289->34397 34294 6c98e34 34293->34294 34401 6c966b8 34294->34401 34405 6c966b0 34294->34405 34295 6c98e52 34301 6c985a3 34298->34301 34299 6c991ba 34299->34223 34301->34299 34409 6c96a00 34301->34409 34413 6c969f4 34301->34413 34305 6c9889f 34304->34305 34306 6c988ce 34305->34306 34417 6c96778 34305->34417 34421 6c96770 34305->34421 34306->34223 34310 6c9892d 34309->34310 34425 6c96868 34310->34425 34429 6c96861 34310->34429 34311 6c99070 34311->34223 34315 6c986ca 34314->34315 34316 6c9879d 34314->34316 34317 6c96a00 CreateProcessA 34315->34317 34318 6c969f4 CreateProcessA 34315->34318 34316->34223 34317->34316 34318->34316 34320 6c98f43 34319->34320 34321 6c960f8 ResumeThread 34320->34321 34322 6c960f0 ResumeThread 34320->34322 34323 6c96197 ResumeThread 34320->34323 34321->34320 34322->34320 34323->34320 34325 6c987bc 34324->34325 34326 6c960f8 ResumeThread 34325->34326 34327 6c960f0 ResumeThread 34325->34327 34328 6c96197 ResumeThread 34325->34328 34326->34325 34327->34325 34328->34325 34330 6c9892d 34329->34330 34331 6c98e21 34329->34331 34335 6c96868 ReadProcessMemory 34330->34335 34336 6c96861 ReadProcessMemory 34330->34336 34331->34330 34332 6c99070 34331->34332 34433 6c965d8 34331->34433 34437 6c965e0 34331->34437 34332->34223 34335->34332 34336->34332 34339 6c96778 WriteProcessMemory 34337->34339 34340 6c96770 WriteProcessMemory 34337->34340 34338 6c988ce 34338->34223 34339->34338 34340->34338 34342 6c98aa0 34341->34342 34344 6c966b8 VirtualAllocEx 34342->34344 34345 6c966b0 VirtualAllocEx 34342->34345 34343 6c98e52 34344->34343 34345->34343 34347 6c987d0 34346->34347 34348 6c960f8 ResumeThread 34347->34348 34349 6c960f0 ResumeThread 34347->34349 34350 6c96197 ResumeThread 34347->34350 34348->34347 34349->34347 34350->34347 34356 6c965d8 Wow64SetThreadContext 34351->34356 34357 6c965e0 Wow64SetThreadContext 34351->34357 34352 6c98866 34353 6c960f8 ResumeThread 34352->34353 34354 6c960f0 ResumeThread 34352->34354 34355 6c96197 ResumeThread 34352->34355 34353->34352 34354->34352 34355->34352 34356->34352 34357->34352 34359 6c98c13 34358->34359 34361 6c96868 ReadProcessMemory 34359->34361 34362 6c96861 ReadProcessMemory 34359->34362 34360 6c99070 34360->34223 34361->34360 34362->34360 34364 6c98ce7 34363->34364 34366 6c96778 WriteProcessMemory 34364->34366 34367 6c96770 WriteProcessMemory 34364->34367 34365 6c98ed5 34366->34365 34367->34365 34369 6c98fce 34368->34369 34371 6c96778 WriteProcessMemory 34369->34371 34372 6c96770 WriteProcessMemory 34369->34372 34370 6c99000 34371->34370 34372->34370 34374 6c98c24 34373->34374 34375 6c98db5 34373->34375 34376 6c96868 ReadProcessMemory 34374->34376 34377 6c96861 ReadProcessMemory 34374->34377 34375->34223 34376->34375 34377->34375 34379 6c98941 34378->34379 34381 6c96778 WriteProcessMemory 34379->34381 34382 6c96770 WriteProcessMemory 34379->34382 34380 6c99000 34381->34380 34382->34380 34384 6c987c5 34383->34384 34385 6c960f8 ResumeThread 34384->34385 34386 6c960f0 ResumeThread 34384->34386 34387 6c96197 ResumeThread 34384->34387 34385->34384 34386->34384 34387->34384 34389 6c96138 ResumeThread 34388->34389 34391 6c96169 34389->34391 34391->34289 34393 6c96132 ResumeThread 34392->34393 34396 6c961a2 34392->34396 34395 6c96169 34393->34395 34395->34289 34396->34289 34398 6c96138 ResumeThread 34397->34398 34400 6c96169 34398->34400 34400->34289 34402 6c966f8 VirtualAllocEx 34401->34402 34404 6c96735 34402->34404 34404->34295 34406 6c966f8 VirtualAllocEx 34405->34406 34408 6c96735 34406->34408 34408->34295 34410 6c96a89 CreateProcessA 34409->34410 34412 6c96c4b 34410->34412 34414 6c96a89 CreateProcessA 34413->34414 34416 6c96c4b 34414->34416 34418 6c967c0 WriteProcessMemory 34417->34418 34420 6c96817 34418->34420 34420->34306 34422 6c967c0 WriteProcessMemory 34421->34422 34424 6c96817 34422->34424 34424->34306 34426 6c96897 ReadProcessMemory 34425->34426 34428 6c968f7 34426->34428 34428->34311 34430 6c96824 ReadProcessMemory 34429->34430 34432 6c968f7 34430->34432 34432->34311 34434 6c96625 Wow64SetThreadContext 34433->34434 34436 6c9666d 34434->34436 34436->34331 34438 6c96625 Wow64SetThreadContext 34437->34438 34440 6c9666d 34438->34440 34440->34331 34441 96d6a8 DuplicateHandle 34442 96d73e 34441->34442 34443 964668 34444 96467a 34443->34444 34445 964686 34444->34445 34447 964778 34444->34447 34448 96479d 34447->34448 34452 964888 34448->34452 34456 964878 34448->34456 34454 9648af 34452->34454 34453 96498c 34453->34453 34454->34453 34460 9644b0 34454->34460 34458 9648af 34456->34458 34457 96498c 34457->34457 34458->34457 34459 9644b0 CreateActCtxA 34458->34459 34459->34457 34461 965918 CreateActCtxA 34460->34461 34463 9659db 34461->34463 34463->34463

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1770 6c96197-6c961a0 1771 6c96132-6c96167 ResumeThread 1770->1771 1772 6c961a2-6c961d7 1770->1772 1783 6c96169-6c9616f 1771->1783 1784 6c96170-6c96195 1771->1784 1774 6c961d9 1772->1774 1775 6c961de-6c96237 1772->1775 1774->1775 1776 6c9634a-6c9635b 1775->1776 1777 6c9623d-6c9623f 1775->1777 1779 6c9635d-6c9635f 1776->1779 1780 6c963d3-6c963e4 1776->1780 1777->1776 1778 6c96245-6c96275 1777->1778 1785 6c9627c-6c9628d 1778->1785 1786 6c96277 1778->1786 1779->1780 1782 6c96361-6c96371 1779->1782 1787 6c963ea-6c963ec 1780->1787 1788 6c965c3-6c965cd 1780->1788 1789 6c96373-6c96380 1782->1789 1790 6c96382 1782->1790 1783->1784 1791 6c9628f 1785->1791 1792 6c96294-6c962aa 1785->1792 1786->1785 1787->1788 1793 6c963f2-6c96422 1787->1793 1797 6c96385-6c963c0 1789->1797 1790->1797 1791->1792 1799 6c962ac 1792->1799 1800 6c962b1-6c962c7 1792->1800 1794 6c96429-6c9643a 1793->1794 1795 6c96424 1793->1795 1801 6c9643c 1794->1801 1802 6c96441-6c96457 1794->1802 1795->1794 1817 6c963c2 1797->1817 1818 6c963c7-6c963ce 1797->1818 1799->1800 1804 6c962c9 1800->1804 1805 6c962ce-6c96329 1800->1805 1801->1802 1806 6c96459 1802->1806 1807 6c9645e-6c96474 1802->1807 1804->1805 1826 6c9632b-6c96331 1805->1826 1827 6c96333 1805->1827 1806->1807 1811 6c9647b-6c964b8 1807->1811 1812 6c96476 1807->1812 1814 6c964ba 1811->1814 1815 6c964bf-6c964d0 1811->1815 1812->1811 1814->1815 1819 6c964d2 1815->1819 1820 6c964d7-6c964ed 1815->1820 1817->1818 1818->1788 1819->1820 1821 6c964ef 1820->1821 1822 6c964f4-6c9650a 1820->1822 1821->1822 1824 6c9650c 1822->1824 1825 6c96511-6c96530 1822->1825 1824->1825 1828 6c9653a 1825->1828 1829 6c96532-6c96538 1825->1829 1830 6c96336-6c96345 1826->1830 1827->1830 1831 6c9653d-6c965ab 1828->1831 1829->1831 1830->1788 1838 6c965ad-6c965b3 1831->1838 1839 6c965b5 1831->1839 1840 6c965b8-6c965c0 1838->1840 1839->1840 1840->1788
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: 1a05c2116f2431954c074a2b077e8a6b43eec9092bb30d131dd1850eef60503a
                                                                                                            • Instruction ID: 3ffd74471519ad1d71f2707f9ba7d21b5b0c90b3754ee4d49681c7b0b8ff7dbb
                                                                                                            • Opcode Fuzzy Hash: 1a05c2116f2431954c074a2b077e8a6b43eec9092bb30d131dd1850eef60503a
                                                                                                            • Instruction Fuzzy Hash: 0E612A74E002198FDB14DFAAC5446AEFBF2FF89304F24816AD418AB255D735A942CFA0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1409 96d450-96d4ef GetCurrentProcess 1413 96d4f1-96d4f7 1409->1413 1414 96d4f8-96d52c GetCurrentThread 1409->1414 1413->1414 1415 96d535-96d569 GetCurrentProcess 1414->1415 1416 96d52e-96d534 1414->1416 1418 96d572-96d58d call 96d62f 1415->1418 1419 96d56b-96d571 1415->1419 1416->1415 1422 96d593-96d5c2 GetCurrentThreadId 1418->1422 1419->1418 1423 96d5c4-96d5ca 1422->1423 1424 96d5cb-96d62d 1422->1424 1423->1424
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0096D4DE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 0096D51B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0096D558
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0096D5B1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: 73d001654b54cadaf049e9dacb7155c3c3bfec77429ae4b56b316c74f91fdd4b
                                                                                                            • Instruction ID: 56e2dbb0537fdcc5a4337376249cb6e67d3418028c41bf6ae58bd298cb18d8d0
                                                                                                            • Opcode Fuzzy Hash: 73d001654b54cadaf049e9dacb7155c3c3bfec77429ae4b56b316c74f91fdd4b
                                                                                                            • Instruction Fuzzy Hash: 9D5146B0E013498FDB14DFAAD548B9EBFF5EF88314F248459E019AB360DB74A944CB61

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1431 96d460-96d4ef GetCurrentProcess 1435 96d4f1-96d4f7 1431->1435 1436 96d4f8-96d52c GetCurrentThread 1431->1436 1435->1436 1437 96d535-96d569 GetCurrentProcess 1436->1437 1438 96d52e-96d534 1436->1438 1440 96d572-96d58d call 96d62f 1437->1440 1441 96d56b-96d571 1437->1441 1438->1437 1444 96d593-96d5c2 GetCurrentThreadId 1440->1444 1441->1440 1445 96d5c4-96d5ca 1444->1445 1446 96d5cb-96d62d 1444->1446 1445->1446
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0096D4DE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 0096D51B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0096D558
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0096D5B1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: ca21bb1ef45538bec72a22cba746905de0bebe2d6b661d3e09ce9649d039ecc0
                                                                                                            • Instruction ID: b6835ee0075db8eca6d46a85b5ead9a41f5db8cc99d31f75a67285e619d8163c
                                                                                                            • Opcode Fuzzy Hash: ca21bb1ef45538bec72a22cba746905de0bebe2d6b661d3e09ce9649d039ecc0
                                                                                                            • Instruction Fuzzy Hash: 3C5154B0E01309CFDB14DFAAD548B9EBBF5EF88314F208459E019A7360DB74A944CB65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1599 6c969f4-6c96a95 1601 6c96ace-6c96aee 1599->1601 1602 6c96a97-6c96aa1 1599->1602 1607 6c96af0-6c96afa 1601->1607 1608 6c96b27-6c96b56 1601->1608 1602->1601 1603 6c96aa3-6c96aa5 1602->1603 1605 6c96ac8-6c96acb 1603->1605 1606 6c96aa7-6c96ab1 1603->1606 1605->1601 1609 6c96ab3 1606->1609 1610 6c96ab5-6c96ac4 1606->1610 1607->1608 1612 6c96afc-6c96afe 1607->1612 1618 6c96b58-6c96b62 1608->1618 1619 6c96b8f-6c96c49 CreateProcessA 1608->1619 1609->1610 1610->1610 1611 6c96ac6 1610->1611 1611->1605 1613 6c96b21-6c96b24 1612->1613 1614 6c96b00-6c96b0a 1612->1614 1613->1608 1616 6c96b0c 1614->1616 1617 6c96b0e-6c96b1d 1614->1617 1616->1617 1617->1617 1621 6c96b1f 1617->1621 1618->1619 1620 6c96b64-6c96b66 1618->1620 1630 6c96c4b-6c96c51 1619->1630 1631 6c96c52-6c96cd8 1619->1631 1622 6c96b89-6c96b8c 1620->1622 1623 6c96b68-6c96b72 1620->1623 1621->1613 1622->1619 1625 6c96b74 1623->1625 1626 6c96b76-6c96b85 1623->1626 1625->1626 1626->1626 1627 6c96b87 1626->1627 1627->1622 1630->1631 1641 6c96ce8-6c96cec 1631->1641 1642 6c96cda-6c96cde 1631->1642 1643 6c96cfc-6c96d00 1641->1643 1644 6c96cee-6c96cf2 1641->1644 1642->1641 1645 6c96ce0 1642->1645 1647 6c96d10-6c96d14 1643->1647 1648 6c96d02-6c96d06 1643->1648 1644->1643 1646 6c96cf4 1644->1646 1645->1641 1646->1643 1650 6c96d26-6c96d2d 1647->1650 1651 6c96d16-6c96d1c 1647->1651 1648->1647 1649 6c96d08 1648->1649 1649->1647 1652 6c96d2f-6c96d3e 1650->1652 1653 6c96d44 1650->1653 1651->1650 1652->1653 1654 6c96d45 1653->1654 1654->1654
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C96C36
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 963392458-0
                                                                                                            • Opcode ID: 9275167f41664bcb3c027bbac63317e59a2a2bbc77bbf864f6800006c4bb7cf4
                                                                                                            • Instruction ID: 729d6d01aa55339870d22108c71ac7d76acef6c97034009beb9bc30e310c38a3
                                                                                                            • Opcode Fuzzy Hash: 9275167f41664bcb3c027bbac63317e59a2a2bbc77bbf864f6800006c4bb7cf4
                                                                                                            • Instruction Fuzzy Hash: A4A16B71D002198FEF64DF69C9457DDBBB2FF48310F1485A9E808A7290DB749A85CFA1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1656 6c96a00-6c96a95 1658 6c96ace-6c96aee 1656->1658 1659 6c96a97-6c96aa1 1656->1659 1664 6c96af0-6c96afa 1658->1664 1665 6c96b27-6c96b56 1658->1665 1659->1658 1660 6c96aa3-6c96aa5 1659->1660 1662 6c96ac8-6c96acb 1660->1662 1663 6c96aa7-6c96ab1 1660->1663 1662->1658 1666 6c96ab3 1663->1666 1667 6c96ab5-6c96ac4 1663->1667 1664->1665 1669 6c96afc-6c96afe 1664->1669 1675 6c96b58-6c96b62 1665->1675 1676 6c96b8f-6c96c49 CreateProcessA 1665->1676 1666->1667 1667->1667 1668 6c96ac6 1667->1668 1668->1662 1670 6c96b21-6c96b24 1669->1670 1671 6c96b00-6c96b0a 1669->1671 1670->1665 1673 6c96b0c 1671->1673 1674 6c96b0e-6c96b1d 1671->1674 1673->1674 1674->1674 1678 6c96b1f 1674->1678 1675->1676 1677 6c96b64-6c96b66 1675->1677 1687 6c96c4b-6c96c51 1676->1687 1688 6c96c52-6c96cd8 1676->1688 1679 6c96b89-6c96b8c 1677->1679 1680 6c96b68-6c96b72 1677->1680 1678->1670 1679->1676 1682 6c96b74 1680->1682 1683 6c96b76-6c96b85 1680->1683 1682->1683 1683->1683 1684 6c96b87 1683->1684 1684->1679 1687->1688 1698 6c96ce8-6c96cec 1688->1698 1699 6c96cda-6c96cde 1688->1699 1700 6c96cfc-6c96d00 1698->1700 1701 6c96cee-6c96cf2 1698->1701 1699->1698 1702 6c96ce0 1699->1702 1704 6c96d10-6c96d14 1700->1704 1705 6c96d02-6c96d06 1700->1705 1701->1700 1703 6c96cf4 1701->1703 1702->1698 1703->1700 1707 6c96d26-6c96d2d 1704->1707 1708 6c96d16-6c96d1c 1704->1708 1705->1704 1706 6c96d08 1705->1706 1706->1704 1709 6c96d2f-6c96d3e 1707->1709 1710 6c96d44 1707->1710 1708->1707 1709->1710 1711 6c96d45 1710->1711 1711->1711
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C96C36
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 963392458-0
                                                                                                            • Opcode ID: 33a15200c2ac158dad105ab2f7616577385fbf58809bfb67d719856033652cc4
                                                                                                            • Instruction ID: 6b0e57f82f046df8aecda667d94178633331e0b7b1801f9c36776ea2f4071ef1
                                                                                                            • Opcode Fuzzy Hash: 33a15200c2ac158dad105ab2f7616577385fbf58809bfb67d719856033652cc4
                                                                                                            • Instruction Fuzzy Hash: 57915A71D002198FEF64DF69C945BDDBBB2FF48310F1485A9E808A7290DB749A85CFA1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1713 96b1c8-96b1d7 1714 96b203-96b207 1713->1714 1715 96b1d9-96b1e6 call 969c38 1713->1715 1716 96b21b-96b25c 1714->1716 1717 96b209-96b213 1714->1717 1720 96b1fc 1715->1720 1721 96b1e8 1715->1721 1724 96b25e-96b266 1716->1724 1725 96b269-96b277 1716->1725 1717->1716 1720->1714 1768 96b1ee call 96b450 1721->1768 1769 96b1ee call 96b460 1721->1769 1724->1725 1727 96b29b-96b29d 1725->1727 1728 96b279-96b27e 1725->1728 1726 96b1f4-96b1f6 1726->1720 1729 96b338-96b3f8 1726->1729 1730 96b2a0-96b2a7 1727->1730 1731 96b280-96b287 call 96ae80 1728->1731 1732 96b289 1728->1732 1763 96b400-96b42b GetModuleHandleW 1729->1763 1764 96b3fa-96b3fd 1729->1764 1735 96b2b4-96b2bb 1730->1735 1736 96b2a9-96b2b1 1730->1736 1734 96b28b-96b299 1731->1734 1732->1734 1734->1730 1738 96b2bd-96b2c5 1735->1738 1739 96b2c8-96b2d1 call 96ae90 1735->1739 1736->1735 1738->1739 1744 96b2d3-96b2db 1739->1744 1745 96b2de-96b2e3 1739->1745 1744->1745 1746 96b2e5-96b2ec 1745->1746 1747 96b301-96b30e 1745->1747 1746->1747 1749 96b2ee-96b2fe call 96aea0 call 96aeb0 1746->1749 1753 96b310-96b32e 1747->1753 1754 96b331-96b337 1747->1754 1749->1747 1753->1754 1765 96b434-96b448 1763->1765 1766 96b42d-96b433 1763->1766 1764->1763 1766->1765 1768->1726 1769->1726
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0096B41E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule
                                                                                                            • String ID:
                                                                                                            • API String ID: 4139908857-0
                                                                                                            • Opcode ID: 01b2940d3228aa6b20e48f7fa9c67d1b46395d73a316eb07267d31c364205f36
                                                                                                            • Instruction ID: b3c1fecbe6909c305e06ce3e2b03b493bd0f3e9b2fa4cb6293fdaa8874647a7a
                                                                                                            • Opcode Fuzzy Hash: 01b2940d3228aa6b20e48f7fa9c67d1b46395d73a316eb07267d31c364205f36
                                                                                                            • Instruction Fuzzy Hash: E0713270A00B048FDB24DF6AD055B9ABBF5FF88304F00892ED45AD7A50EB75E885CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1842 9644b0-9659d9 CreateActCtxA 1845 9659e2-965a3c 1842->1845 1846 9659db-9659e1 1842->1846 1853 965a3e-965a41 1845->1853 1854 965a4b-965a4f 1845->1854 1846->1845 1853->1854 1855 965a60 1854->1855 1856 965a51-965a5d 1854->1856 1857 965a61 1855->1857 1856->1855 1857->1857
                                                                                                            APIs
                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 009659C9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Create
                                                                                                            • String ID:
                                                                                                            • API String ID: 2289755597-0
                                                                                                            • Opcode ID: e263d40653f8eb328b397bf17df511cf9382d6e04dded039ccc02899f6bc5d40
                                                                                                            • Instruction ID: 7d26a26a83cab8b7cd9a547cd10d2d3c209c8db6f7274565cfbee7d73202d0c1
                                                                                                            • Opcode Fuzzy Hash: e263d40653f8eb328b397bf17df511cf9382d6e04dded039ccc02899f6bc5d40
                                                                                                            • Instruction Fuzzy Hash: 6941DFB0C00719CBDF24DFA9C984B8EBBB9FF48304F60816AD409AB255DBB56945CF90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1859 96590c-9659d9 CreateActCtxA 1861 9659e2-965a3c 1859->1861 1862 9659db-9659e1 1859->1862 1869 965a3e-965a41 1861->1869 1870 965a4b-965a4f 1861->1870 1862->1861 1869->1870 1871 965a60 1870->1871 1872 965a51-965a5d 1870->1872 1873 965a61 1871->1873 1872->1871 1873->1873
                                                                                                            APIs
                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 009659C9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Create
                                                                                                            • String ID:
                                                                                                            • API String ID: 2289755597-0
                                                                                                            • Opcode ID: 772a48ccc8616fadcca1936d29f02079968cf11eff053ac855833683197799bb
                                                                                                            • Instruction ID: e85bd68ef3ff43e524f15d387c082520021f3b1607b4206816932c3ba122481d
                                                                                                            • Opcode Fuzzy Hash: 772a48ccc8616fadcca1936d29f02079968cf11eff053ac855833683197799bb
                                                                                                            • Instruction Fuzzy Hash: A041DFB1C00659CFDF24CFA9C984BDEBBB5BF48304F24816AD408AB255DB756946CF90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1875 6c96770-6c967c6 1877 6c967c8-6c967d4 1875->1877 1878 6c967d6-6c96815 WriteProcessMemory 1875->1878 1877->1878 1880 6c9681e-6c9684e 1878->1880 1881 6c96817-6c9681d 1878->1881 1881->1880
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C96808
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: db061ca9e314919feddd7b8151293db4f77f3ee5ab023fcf32b22f7c8d1b7bce
                                                                                                            • Instruction ID: 107a9ec94897d047e0f03313212036f0f02195dd39a5a70f160420c4f69a4ad3
                                                                                                            • Opcode Fuzzy Hash: db061ca9e314919feddd7b8151293db4f77f3ee5ab023fcf32b22f7c8d1b7bce
                                                                                                            • Instruction Fuzzy Hash: 282137B5D002099FDF10DFA9C985BDEBBF1FF48310F10842AE918A7250D7789940DB60

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1885 6c96778-6c967c6 1887 6c967c8-6c967d4 1885->1887 1888 6c967d6-6c96815 WriteProcessMemory 1885->1888 1887->1888 1890 6c9681e-6c9684e 1888->1890 1891 6c96817-6c9681d 1888->1891 1891->1890
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C96808
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: 05839a1fd9f8fe96063a0c329f9f8cc2d91a6a9f64c10d9657a6e37fa4269fbb
                                                                                                            • Instruction ID: 72ad37ea9a4cb435a80aaa62fb086a494e0fcdaac43325f851ce02aa51af6258
                                                                                                            • Opcode Fuzzy Hash: 05839a1fd9f8fe96063a0c329f9f8cc2d91a6a9f64c10d9657a6e37fa4269fbb
                                                                                                            • Instruction Fuzzy Hash: 1A2124B59003499FDF10DFAAC985BDEBBF5FF48320F10842AE919A7250D7789940DBA4
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C9665E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: e28f2995f7dd44005de01b696b533a02133ae3723fd371a1cf359c4b9f8ef975
                                                                                                            • Instruction ID: 7d97f8fe050d06ae4a789fb62c977162fbbfa22c846247c08bed3b76781902fa
                                                                                                            • Opcode Fuzzy Hash: e28f2995f7dd44005de01b696b533a02133ae3723fd371a1cf359c4b9f8ef975
                                                                                                            • Instruction Fuzzy Hash: 612139B5D002098FDB10DFAAC585BEEBBF5EF98324F14842AD419A7380D7789945CBA1
                                                                                                            APIs
                                                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C996C5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 410705778-0
                                                                                                            • Opcode ID: cffffa59e515273e4f6c5541dfa7db3d866d227064355c7b2b0567ee0c6ce310
                                                                                                            • Instruction ID: 03fa5a3d11af38b7cc56df830be35980438d3526adee9477880a12965c02cd45
                                                                                                            • Opcode Fuzzy Hash: cffffa59e515273e4f6c5541dfa7db3d866d227064355c7b2b0567ee0c6ce310
                                                                                                            • Instruction Fuzzy Hash: FE21A9B6D052188BDF61DFA6D809BDEBBF4AF88310F18805DD406B7251CB396A40CBB1
                                                                                                            APIs
                                                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C968E8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 1726664587-0
                                                                                                            • Opcode ID: 88fdd72fafb2755f78b7d933124134d2e3398c3c1965b1694261161913b76ad0
                                                                                                            • Instruction ID: be573dae3b16c6e35e628d72042f9f2a0b3c93ced42a34fd0fc14adfb5a886f9
                                                                                                            • Opcode Fuzzy Hash: 88fdd72fafb2755f78b7d933124134d2e3398c3c1965b1694261161913b76ad0
                                                                                                            • Instruction Fuzzy Hash: 362157B1D003499FDF14DFAAC985AEEBBF5FF48320F10842AE519A7250C7389504DBA4
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0096D72F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: 8ad0ac3857a0682935bcf10bdbfc325f5b41d300132fe69abc2b0bef793d4bca
                                                                                                            • Instruction ID: 5bbc6d58a514fd4ec527f0b39fc5f529cf09c3a781fa593bc05909902c5d390c
                                                                                                            • Opcode Fuzzy Hash: 8ad0ac3857a0682935bcf10bdbfc325f5b41d300132fe69abc2b0bef793d4bca
                                                                                                            • Instruction Fuzzy Hash: DD21C4B5D012499FDB10CFAAD984ADEBFF5EB48320F14841AE918A7350D378A945CFA1
                                                                                                            APIs
                                                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C968E8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 1726664587-0
                                                                                                            • Opcode ID: eac02668a0bb4e3c20b884e32299ba155315f5cf0824ceec2537ed33782df00b
                                                                                                            • Instruction ID: d61f74130881450cc9443b80d6c4e7b8a6b3215e6d8896f8fdf48407a17dc9b0
                                                                                                            • Opcode Fuzzy Hash: eac02668a0bb4e3c20b884e32299ba155315f5cf0824ceec2537ed33782df00b
                                                                                                            • Instruction Fuzzy Hash: 202125B1D003499FDF10DFAAC985AEEBBF5FF48320F10842AE519A7250C7789900DBA5
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C9665E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: 69171e42e22f5067480714b9110c0cc31e94aba5ed7e9468b3682798a32232be
                                                                                                            • Instruction ID: c5f8f0345b931b207406fa84670e09455025f318cf7931b3b193b0a8149516d7
                                                                                                            • Opcode Fuzzy Hash: 69171e42e22f5067480714b9110c0cc31e94aba5ed7e9468b3682798a32232be
                                                                                                            • Instruction Fuzzy Hash: 9A2138B1D003098FDB10DFAAC585BAEBBF4EF98324F14842AD419A7340C7789945CFA1
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0096D72F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: 122db549b36ce5b9ca79f231f82c4c89bf485e64ce84a98b5c5a10500cb1b4b1
                                                                                                            • Instruction ID: ac83e74c2f5a129cd512d4c846260af2ff55b33d4cef6ea8a58ea9b91f66b51c
                                                                                                            • Opcode Fuzzy Hash: 122db549b36ce5b9ca79f231f82c4c89bf485e64ce84a98b5c5a10500cb1b4b1
                                                                                                            • Instruction Fuzzy Hash: 5421C4B5D012499FDB10CFAAD984ADEBBF9EB48320F14841AE914A7350D374A944CFA5
                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C96726
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: 40b8c7fe021923612443bbfbc33b5eeb0a46bff84d0026fcdcad3cf797c8aca3
                                                                                                            • Instruction ID: f4d837ba658ee3336c519b3e4c3d4f4308e27a475aad38e1a0d9678b67f582ed
                                                                                                            • Opcode Fuzzy Hash: 40b8c7fe021923612443bbfbc33b5eeb0a46bff84d0026fcdcad3cf797c8aca3
                                                                                                            • Instruction Fuzzy Hash: BA1159B59002498FDF10DFAAC945BEEBFF5EF48320F24841AE519A7250C7759544DFA0
                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C96726
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: 5f55eac1b0ca034c8456d923186ba188ee5f3b9938ba2fbd5a0575daf1462b90
                                                                                                            • Instruction ID: 44927bbf93f1d1ad2d8dd5d4d48496480d48ec8fb4f2d04cb7247b5f1f01b945
                                                                                                            • Opcode Fuzzy Hash: 5f55eac1b0ca034c8456d923186ba188ee5f3b9938ba2fbd5a0575daf1462b90
                                                                                                            • Instruction Fuzzy Hash: 5B1137B59002499FDF10DFAAC845ADEBFF5EF88320F248419E519A7250C775A940DFA1
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: 0bcd7e677bdce71d33702e660b509a265e0bdcac17020e0c015c47f80df02243
                                                                                                            • Instruction ID: 69e60600aa33310461e54811e9fd3afa243bebfcdb808ec5e84dc280542bf495
                                                                                                            • Opcode Fuzzy Hash: 0bcd7e677bdce71d33702e660b509a265e0bdcac17020e0c015c47f80df02243
                                                                                                            • Instruction Fuzzy Hash: AE1158B5D003498FDB24DFAAC4457AEFBF5AF88324F24841AD119A7350C775A940CBA4
                                                                                                            APIs
                                                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C996C5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 410705778-0
                                                                                                            • Opcode ID: 3462061733df7fb7c889589592bf5a9f30947cf3530593e81c2bd7a6357236ab
                                                                                                            • Instruction ID: d9eb157e3705714d1e1ebe31ee5811ba82ab8b6e008ec420de720b08711d2b88
                                                                                                            • Opcode Fuzzy Hash: 3462061733df7fb7c889589592bf5a9f30947cf3530593e81c2bd7a6357236ab
                                                                                                            • Instruction Fuzzy Hash: 1511E3B58003499FDB50DF99C945BDEBBF8EB48324F248419E518A7610D375A944CFB1
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ResumeThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 947044025-0
                                                                                                            • Opcode ID: 622597586a2f844e5d8f7c4242194fb799fa6049071594ec8172ba565aa74038
                                                                                                            • Instruction ID: 0de0d6718dab51e8c6d24957ff31cf34501c16610ce252f453c7bc41bb755ab2
                                                                                                            • Opcode Fuzzy Hash: 622597586a2f844e5d8f7c4242194fb799fa6049071594ec8172ba565aa74038
                                                                                                            • Instruction Fuzzy Hash: 4E113AB1D003498FDB20DFAAC84579EFBF5EF88324F248419D519A7350C775A940CBA5
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0096B41E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1744501577.0000000000960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00960000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_960000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule
                                                                                                            • String ID:
                                                                                                            • API String ID: 4139908857-0
                                                                                                            • Opcode ID: 432b9540a90c7137872945b6987d5a587156d36d998f8923a6ec023e11cf93dc
                                                                                                            • Instruction ID: 0beae3db4612d51136be4744bcb32857ddbe921e138a993f4eed0d742775c3de
                                                                                                            • Opcode Fuzzy Hash: 432b9540a90c7137872945b6987d5a587156d36d998f8923a6ec023e11cf93dc
                                                                                                            • Instruction Fuzzy Hash: 38110FB5C002498FDB20CF9AC444ADEFBF8EB88324F14841AD419A7320D379A545CFA1
                                                                                                            APIs
                                                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C996C5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1751201671.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_6c90000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 410705778-0
                                                                                                            • Opcode ID: 85c0d131009c3a4af3f6385055b81fb7a2f81067430c09e9521143f829c20829
                                                                                                            • Instruction ID: bdfa72809dc8bb076fd2ecef26049868578e32ec67d03a9e4aca33286c7a24d1
                                                                                                            • Opcode Fuzzy Hash: 85c0d131009c3a4af3f6385055b81fb7a2f81067430c09e9521143f829c20829
                                                                                                            • Instruction Fuzzy Hash: 4D1122B5800348DFDB50DF9AC989BDEBBF8EB48320F24841AE518A7310D375A940CFA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742660431.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7cd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d35d3803361ac957af0189aa03de5d5dc69e883964e65a3fd092b81c2f3b407d
                                                                                                            • Instruction ID: b0bb48517a423ac620aaa8fa4815043d83991d536d0096ecca454ede0ed1d7a6
                                                                                                            • Opcode Fuzzy Hash: d35d3803361ac957af0189aa03de5d5dc69e883964e65a3fd092b81c2f3b407d
                                                                                                            • Instruction Fuzzy Hash: 9021C1B2504240DFDB25DF14E9C0F26BF65FB98318F24C57DE9090A256C33AD866DAA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742791404.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7dd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 602bf226aac0339c81e5f4e135bdb775bd667403754bd51ae187b3977823f37c
                                                                                                            • Instruction ID: 9f3c8dd273bfae05bbd573d47bb18f66cf93a6d5c829f5e2bca8abe11c8352b1
                                                                                                            • Opcode Fuzzy Hash: 602bf226aac0339c81e5f4e135bdb775bd667403754bd51ae187b3977823f37c
                                                                                                            • Instruction Fuzzy Hash: 8921D0B5604204DFCB24DF24D9C4B26BB75EBC8314F24C96AE90A4B396C33ADC47CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742791404.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7dd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 16799ea948ee0bc15e751661c04e3d9b3c747a9a1c34fe809ec35380cf6c1d26
                                                                                                            • Instruction ID: 81f6ac43d4ab381805e2c74542bab93c85790bb386855ba408395d0ba2af10ac
                                                                                                            • Opcode Fuzzy Hash: 16799ea948ee0bc15e751661c04e3d9b3c747a9a1c34fe809ec35380cf6c1d26
                                                                                                            • Instruction Fuzzy Hash: CC2104B1504204EFDB25DF54D9C0B26BBB5FB88314F24C96EE9494B392C33AEC46CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742791404.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7dd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cac0a0e5b3e18ce3c3a9415ae862010c4dd8fc78305cdc3eeaf3fa74c2182acf
                                                                                                            • Instruction ID: 16311fafa7bd6129125bace155458e07f07bf797037b5f38051d4bc4f80c56ef
                                                                                                            • Opcode Fuzzy Hash: cac0a0e5b3e18ce3c3a9415ae862010c4dd8fc78305cdc3eeaf3fa74c2182acf
                                                                                                            • Instruction Fuzzy Hash: DF2171755083849FCB12CF24D994711BF71EB86314F28C5DAD8498B2A7C33ADC46CB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742660431.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7cd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                            • Instruction ID: 1fda16c7866e262735c7834cb1fb3a7894ec5a740e064cb1221dac11ea22a596
                                                                                                            • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                            • Instruction Fuzzy Hash: 6A11B176504280CFCB16CF14E9C4B16BF72FB94318F24C6ADD8494B656C33AD86ACBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742791404.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7dd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction ID: b4a184e9936f509b25920392fe073544f772765fc0f6af5e6dca44ad3a2ead87
                                                                                                            • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                            • Instruction Fuzzy Hash: 5F118B75504280DFDB26CF14D6C4B15BBB2FB84324F24C6AAD8494B796C33AE84ACB61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742660431.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7cd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8c5e5a8233df20a6ec2b9a27dc221f2cd7ff1b2d12c3cca1e43742d2cb3cdbbb
                                                                                                            • Instruction ID: c4c1e607df085f288d9287812636b317500f854e16c52c4052f069b9860a7b8d
                                                                                                            • Opcode Fuzzy Hash: 8c5e5a8233df20a6ec2b9a27dc221f2cd7ff1b2d12c3cca1e43742d2cb3cdbbb
                                                                                                            • Instruction Fuzzy Hash: 8701A2720083409AEB309E69CDC4F66BFA8DF51364F18C52EED094A296D77D9C41DAB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000009.00000002.1742660431.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_9_2_7cd000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1f5c44960c203661bd531728df3600fb2e991f5dd2b784ff11cc267063d4c76f
                                                                                                            • Instruction ID: 1627ea4f2135690307e858b6a400fd9f29416aa149ff7b4f070b18e5ca6589fb
                                                                                                            • Opcode Fuzzy Hash: 1f5c44960c203661bd531728df3600fb2e991f5dd2b784ff11cc267063d4c76f
                                                                                                            • Instruction Fuzzy Hash: 21F06272404344AEFB209E15D9C4B62FFD8EB51734F18C45EED084A296C3799C44CBB1

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:11.7%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:0%
                                                                                                            Total number of Nodes:17
                                                                                                            Total number of Limit Nodes:4
                                                                                                            execution_graph 26815 16d0848 26817 16d084e 26815->26817 26816 16d091b 26817->26816 26819 16d1380 26817->26819 26821 16d1396 26819->26821 26820 16d1480 26820->26817 26821->26820 26823 16d7eb0 26821->26823 26824 16d7eba 26823->26824 26825 16d7ed4 26824->26825 26828 6d3fa09 26824->26828 26832 6d3fa18 26824->26832 26825->26821 26830 6d3fa18 26828->26830 26829 6d3fc42 26829->26825 26830->26829 26831 6d3fc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 26830->26831 26831->26830 26834 6d3fa2d 26832->26834 26833 6d3fc42 26833->26825 26834->26833 26835 6d3fc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 26834->26835 26835->26834

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 130 6d33040-6d33061 131 6d33063-6d33066 130->131 132 6d33807-6d3380a 131->132 133 6d3306c-6d3308b 131->133 134 6d33830-6d33832 132->134 135 6d3380c-6d3382b 132->135 142 6d330a4-6d330ae 133->142 143 6d3308d-6d33090 133->143 137 6d33834 134->137 138 6d33839-6d3383c 134->138 135->134 137->138 138->131 140 6d33842-6d3384b 138->140 148 6d330b4-6d330c3 142->148 143->142 145 6d33092-6d330a2 143->145 145->148 256 6d330c5 call 6d33860 148->256 257 6d330c5 call 6d33859 148->257 149 6d330ca-6d330cf 150 6d330d1-6d330d7 149->150 151 6d330dc-6d333b9 149->151 150->140 172 6d337f9-6d33806 151->172 173 6d333bf-6d3346e 151->173 182 6d33470-6d33495 173->182 183 6d33497 173->183 184 6d334a0-6d334b3 182->184 183->184 187 6d337e0-6d337ec 184->187 188 6d334b9-6d334db 184->188 187->173 189 6d337f2 187->189 188->187 191 6d334e1-6d334eb 188->191 189->172 191->187 192 6d334f1-6d334fc 191->192 192->187 193 6d33502-6d335d8 192->193 205 6d335e6-6d33616 193->205 206 6d335da-6d335dc 193->206 210 6d33624-6d33630 205->210 211 6d33618-6d3361a 205->211 206->205 212 6d33632-6d33636 210->212 213 6d33690-6d33694 210->213 211->210 212->213 216 6d33638-6d33662 212->216 214 6d337d1-6d337da 213->214 215 6d3369a-6d336d6 213->215 214->187 214->193 226 6d336e4-6d336f2 215->226 227 6d336d8-6d336da 215->227 223 6d33670-6d3368d 216->223 224 6d33664-6d33666 216->224 223->213 224->223 230 6d336f4-6d336ff 226->230 231 6d33709-6d33714 226->231 227->226 230->231 236 6d33701 230->236 234 6d33716-6d3371c 231->234 235 6d3372c-6d3373d 231->235 237 6d33720-6d33722 234->237 238 6d3371e 234->238 240 6d33755-6d33761 235->240 241 6d3373f-6d33745 235->241 236->231 237->235 238->235 245 6d33763-6d33769 240->245 246 6d33779-6d337ca 240->246 242 6d33747 241->242 243 6d33749-6d3374b 241->243 242->240 243->240 247 6d3376b 245->247 248 6d3376d-6d3376f 245->248 246->214 247->246 248->246 256->149 257->149
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1582559945
                                                                                                            • Opcode ID: d6dc663f9dba283fb4c2d534cfa1e44e060b1cceccdcf3b86f9c2ebd685fba9e
                                                                                                            • Instruction ID: a878de7cf0408299b8eeab4c52572dafa37812073a0c6939430f533b2a74d3aa
                                                                                                            • Opcode Fuzzy Hash: d6dc663f9dba283fb4c2d534cfa1e44e060b1cceccdcf3b86f9c2ebd685fba9e
                                                                                                            • Instruction Fuzzy Hash: 4B321C31E1076ACBCB14DF75C99459DB7B2FFD9300F2186AAD409A7264EB30AD85CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1154 6d37d68-6d37d86 1156 6d37d88-6d37d8b 1154->1156 1157 6d37da2-6d37da5 1156->1157 1158 6d37d8d-6d37d9b 1156->1158 1159 6d37da7-6d37dc1 1157->1159 1160 6d37dc6-6d37dc9 1157->1160 1164 6d37e0e-6d37e24 1158->1164 1165 6d37d9d 1158->1165 1159->1160 1162 6d37dd6-6d37dd9 1160->1162 1163 6d37dcb-6d37dd5 1160->1163 1167 6d37ddb-6d37df7 1162->1167 1168 6d37dfc-6d37dfe 1162->1168 1174 6d37e2a-6d37e33 1164->1174 1175 6d3803f-6d38049 1164->1175 1165->1157 1167->1168 1169 6d37e00 1168->1169 1170 6d37e05-6d37e08 1168->1170 1169->1170 1170->1156 1170->1164 1176 6d3804a-6d3807f 1174->1176 1177 6d37e39-6d37e56 1174->1177 1181 6d38081-6d38084 1176->1181 1187 6d3802c-6d38039 1177->1187 1188 6d37e5c-6d37e84 1177->1188 1183 6d380a7-6d380aa 1181->1183 1184 6d38086-6d380a2 1181->1184 1185 6d380b0-6d380bf 1183->1185 1186 6d382df-6d382e2 1183->1186 1184->1183 1197 6d380c1-6d380dc 1185->1197 1198 6d380de-6d38122 1185->1198 1190 6d382e8-6d382f4 1186->1190 1191 6d3838d-6d3838f 1186->1191 1187->1174 1187->1175 1188->1187 1204 6d37e8a-6d37e93 1188->1204 1199 6d382ff-6d38301 1190->1199 1193 6d38391 1191->1193 1194 6d38396-6d38399 1191->1194 1193->1194 1194->1181 1200 6d3839f-6d383a8 1194->1200 1197->1198 1211 6d382b3-6d382c9 1198->1211 1212 6d38128-6d38139 1198->1212 1202 6d38303-6d38309 1199->1202 1203 6d38319-6d3831d 1199->1203 1206 6d3830b 1202->1206 1207 6d3830d-6d3830f 1202->1207 1208 6d3832b 1203->1208 1209 6d3831f-6d38329 1203->1209 1204->1176 1213 6d37e99-6d37eb5 1204->1213 1206->1203 1207->1203 1214 6d38330-6d38332 1208->1214 1209->1214 1211->1186 1221 6d3813f-6d3815c 1212->1221 1222 6d3829e-6d382ad 1212->1222 1224 6d37ebb-6d37ee5 1213->1224 1225 6d3801a-6d38026 1213->1225 1217 6d38343-6d3837c 1214->1217 1218 6d38334-6d38337 1214->1218 1217->1185 1238 6d38382-6d3838c 1217->1238 1218->1200 1221->1222 1234 6d38162-6d38258 call 6d36590 1221->1234 1222->1211 1222->1212 1239 6d38010-6d38015 1224->1239 1240 6d37eeb-6d37f13 1224->1240 1225->1187 1225->1204 1288 6d38266 1234->1288 1289 6d3825a-6d38264 1234->1289 1239->1225 1240->1239 1246 6d37f19-6d37f47 1240->1246 1246->1239 1252 6d37f4d-6d37f56 1246->1252 1252->1239 1253 6d37f5c-6d37f8e 1252->1253 1261 6d37f90-6d37f94 1253->1261 1262 6d37f99-6d37fb5 1253->1262 1261->1239 1264 6d37f96 1261->1264 1262->1225 1263 6d37fb7-6d3800e call 6d36590 1262->1263 1263->1225 1264->1262 1290 6d3826b-6d3826d 1288->1290 1289->1290 1290->1222 1291 6d3826f-6d38274 1290->1291 1292 6d38282 1291->1292 1293 6d38276-6d38280 1291->1293 1294 6d38287-6d38289 1292->1294 1293->1294 1294->1222 1295 6d3828b-6d38297 1294->1295 1295->1222
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq
                                                                                                            • API String ID: 0-2537786760
                                                                                                            • Opcode ID: 7cb163e29389617307ebd6b13844ff06c78e6fd246a9d5b91facc559a1010069
                                                                                                            • Instruction ID: 8f197aaa3ce6554a8c534d5291330399a0f24c2488e33ddf3a153a53722e3adc
                                                                                                            • Opcode Fuzzy Hash: 7cb163e29389617307ebd6b13844ff06c78e6fd246a9d5b91facc559a1010069
                                                                                                            • Instruction Fuzzy Hash: 5B028134B002269FDB54DF65D690A6EB7B2FF84310F148929E805EB394DB75EC82DB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a99f1522fc2c651f70f69cbe67862ac0bf5fb9357e1581a7f3ad6f86818a722d
                                                                                                            • Instruction ID: 6970d293c7d892f49d2dd4fd6dc72d5081bbc3d20a38dc9c27d202c111b75f73
                                                                                                            • Opcode Fuzzy Hash: a99f1522fc2c651f70f69cbe67862ac0bf5fb9357e1581a7f3ad6f86818a722d
                                                                                                            • Instruction Fuzzy Hash: F9226F74E102298FDF64CBA9D5807AEB7B2FB59310F24842BE445DB395DA34DC81CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 6d3acb8-6d3acd6 1 6d3acd8-6d3acdb 0->1 2 6d3ace5-6d3ace8 1->2 3 6d3acdd-6d3ace2 1->3 4 6d3ad0b-6d3ad0e 2->4 5 6d3acea-6d3ad06 2->5 3->2 6 6d3ad10-6d3ad14 4->6 7 6d3ad1f-6d3ad22 4->7 5->4 8 6d3aee4-6d3aeee 6->8 9 6d3ad1a 6->9 10 6d3ad24-6d3ad37 7->10 11 6d3ad3c-6d3ad3f 7->11 9->7 10->11 13 6d3ad41-6d3ad4a 11->13 14 6d3ad4f-6d3ad52 11->14 13->14 16 6d3aed5-6d3aede 14->16 17 6d3ad58-6d3ad5b 14->17 16->8 20 6d3ad5d-6d3ad66 16->20 19 6d3ad75-6d3ad78 17->19 17->20 23 6d3ad7a-6d3ad87 19->23 24 6d3ad8c-6d3ad8e 19->24 21 6d3aeef-6d3af01 20->21 22 6d3ad6c-6d3ad70 20->22 30 6d3af03-6d3af06 21->30 31 6d3aece-6d3aed0 21->31 22->19 23->24 25 6d3ad90 24->25 26 6d3ad95-6d3ad98 24->26 25->26 26->1 28 6d3ad9e-6d3adc2 26->28 35 6d3aed2 28->35 44 6d3adc8-6d3add7 28->44 32 6d3af09-6d3af26 30->32 33 6d3af08 30->33 31->35 36 6d3af3d-6d3af6c 31->36 37 6d3af28-6d3af2b 32->37 33->32 35->16 42 6d3af72-6d3af7e 36->42 43 6d3b15f-6d3b172 36->43 38 6d3af31-6d3af39 37->38 39 6d3b194-6d3b197 37->39 38->36 45 6d3b1a6-6d3b1a9 39->45 46 6d3b199 call 6d3b21b 39->46 59 6d3af80-6d3af99 42->59 60 6d3af9e-6d3afe2 42->60 47 6d3b174 43->47 61 6d3add9-6d3addf 44->61 62 6d3adef-6d3ae2a call 6d36590 44->62 48 6d3b1ab-6d3b1af 45->48 49 6d3b1ba-6d3b1bd 45->49 55 6d3b19f-6d3b1a1 46->55 58 6d3b175 47->58 48->38 50 6d3b1b5 48->50 51 6d3b1ca-6d3b1cd 49->51 52 6d3b1bf-6d3b1c9 49->52 50->49 56 6d3b1f0-6d3b1f2 51->56 57 6d3b1cf-6d3b1eb 51->57 55->45 63 6d3b1f4 56->63 64 6d3b1f9-6d3b1fc 56->64 57->56 58->58 59->47 81 6d3afe4-6d3aff6 60->81 82 6d3affe-6d3b03d 60->82 65 6d3ade3-6d3ade5 61->65 66 6d3ade1 61->66 83 6d3ae42-6d3ae59 62->83 84 6d3ae2c-6d3ae32 62->84 63->64 64->37 68 6d3b202-6d3b20c 64->68 65->62 66->62 81->82 90 6d3b043-6d3b11e call 6d36590 82->90 91 6d3b124-6d3b139 82->91 96 6d3ae71-6d3ae82 83->96 97 6d3ae5b-6d3ae61 83->97 85 6d3ae36-6d3ae38 84->85 86 6d3ae34 84->86 85->83 86->83 90->91 91->43 103 6d3ae84-6d3ae8a 96->103 104 6d3ae9a-6d3aecb 96->104 99 6d3ae63 97->99 100 6d3ae65-6d3ae67 97->100 99->96 100->96 106 6d3ae8e-6d3ae90 103->106 107 6d3ae8c 103->107 104->35 106->104 107->104
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-3929485403
                                                                                                            • Opcode ID: 090e68a0843e5aed8848fd85369bb5322a6abb2945a6f2bba6657f4ec861fcbb
                                                                                                            • Instruction ID: af2b1529280689e832a1e4289917b5173ff0309488a3d38d84c76b8b8c927799
                                                                                                            • Opcode Fuzzy Hash: 090e68a0843e5aed8848fd85369bb5322a6abb2945a6f2bba6657f4ec861fcbb
                                                                                                            • Instruction Fuzzy Hash: ABE17030F102159FCB65DF69D9806AEB7B2FF85300F14892AE845EB254EB75DC42CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 258 6d39138-6d3915d 259 6d3915f-6d39162 258->259 260 6d39a20-6d39a23 259->260 261 6d39168-6d3917d 259->261 262 6d39a25-6d39a44 260->262 263 6d39a49-6d39a4b 260->263 268 6d39195-6d391ab 261->268 269 6d3917f-6d39185 261->269 262->263 265 6d39a52-6d39a55 263->265 266 6d39a4d 263->266 265->259 270 6d39a5b-6d39a65 265->270 266->265 275 6d391b6-6d391b8 268->275 271 6d39187 269->271 272 6d39189-6d3918b 269->272 271->268 272->268 276 6d391d0-6d39241 275->276 277 6d391ba-6d391c0 275->277 288 6d39243-6d39266 276->288 289 6d3926d-6d39289 276->289 278 6d391c2 277->278 279 6d391c4-6d391c6 277->279 278->276 279->276 288->289 294 6d392b5-6d392d0 289->294 295 6d3928b-6d392ae 289->295 300 6d392d2-6d392f4 294->300 301 6d392fb-6d39316 294->301 295->294 300->301 306 6d3933b-6d39349 301->306 307 6d39318-6d39334 301->307 308 6d3934b-6d39354 306->308 309 6d39359-6d393d3 306->309 307->306 308->270 315 6d39420-6d39435 309->315 316 6d393d5-6d393f3 309->316 315->260 320 6d393f5-6d39404 316->320 321 6d3940f-6d3941e 316->321 320->321 321->315 321->316
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-2113499236
                                                                                                            • Opcode ID: 5876047b6a66080281806765607b4358619729c79be09dec560fcea74f01b038
                                                                                                            • Instruction ID: 6f910b9a5f037ab29a4a3b6457bc42d39cec28f2f675515cc967fc37ead10d91
                                                                                                            • Opcode Fuzzy Hash: 5876047b6a66080281806765607b4358619729c79be09dec560fcea74f01b038
                                                                                                            • Instruction Fuzzy Hash: C7917330F0021A9FDB54DF65DAA076E73B6FF89200F508569C409EB358EF759D828B90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 324 6d3cf28-6d3cf43 325 6d3cf45-6d3cf48 324->325 326 6d3cf91-6d3cf94 325->326 327 6d3cf4a-6d3cf8c 325->327 328 6d3d414-6d3d420 326->328 329 6d3cf9a-6d3cf9d 326->329 327->326 332 6d3d122-6d3d131 328->332 333 6d3d426-6d3d713 328->333 330 6d3cfe6-6d3cfe9 329->330 331 6d3cf9f-6d3cfae 329->331 335 6d3d032-6d3d035 330->335 336 6d3cfeb-6d3d02d 330->336 339 6d3cfb0-6d3cfb5 331->339 340 6d3cfbd-6d3cfc9 331->340 337 6d3d133-6d3d138 332->337 338 6d3d140-6d3d14c 332->338 537 6d3d93a-6d3d944 333->537 538 6d3d719-6d3d71f 333->538 345 6d3d037-6d3d079 335->345 346 6d3d07e-6d3d081 335->346 336->335 337->338 343 6d3d152-6d3d164 338->343 344 6d3d945-6d3d97e 338->344 339->340 340->344 347 6d3cfcf-6d3cfe1 340->347 360 6d3d169-6d3d16c 343->360 364 6d3d980-6d3d983 344->364 345->346 349 6d3d083-6d3d09f 346->349 350 6d3d0a4-6d3d0a7 346->350 347->330 349->350 351 6d3d0f0-6d3d0f3 350->351 352 6d3d0a9-6d3d0eb 350->352 361 6d3d0f5-6d3d0fa 351->361 362 6d3d0fd-6d3d100 351->362 352->351 369 6d3d17b-6d3d17e 360->369 370 6d3d16e-6d3d170 360->370 361->362 371 6d3d102-6d3d118 362->371 372 6d3d11d-6d3d120 362->372 373 6d3d9a6-6d3d9a9 364->373 374 6d3d985-6d3d9a1 364->374 381 6d3d180-6d3d1c2 369->381 382 6d3d1c7-6d3d1ca 369->382 378 6d3d411 370->378 379 6d3d176 370->379 371->372 372->332 372->360 375 6d3d9ab 373->375 376 6d3d9b8-6d3d9bb 373->376 374->373 584 6d3d9ab call 6d3dab0 375->584 585 6d3d9ab call 6d3da9d 375->585 389 6d3d9ee-6d3d9f0 376->389 390 6d3d9bd-6d3d9e9 376->390 378->328 379->369 381->382 391 6d3d213-6d3d216 382->391 392 6d3d1cc-6d3d20e 382->392 398 6d3d9f2 389->398 399 6d3d9f7-6d3d9fa 389->399 390->389 393 6d3d225-6d3d228 391->393 394 6d3d218-6d3d21a 391->394 392->391 404 6d3d271-6d3d274 393->404 405 6d3d22a-6d3d26c 393->405 402 6d3d220 394->402 403 6d3d2cf-6d3d2d8 394->403 396 6d3d9b1-6d3d9b3 396->376 398->399 399->364 409 6d3d9fc-6d3da0b 399->409 402->393 411 6d3d2e7-6d3d2f3 403->411 412 6d3d2da-6d3d2df 403->412 414 6d3d276-6d3d2b8 404->414 415 6d3d2bd-6d3d2bf 404->415 405->404 427 6d3da72-6d3da87 409->427 428 6d3da0d-6d3da70 call 6d36590 409->428 419 6d3d404-6d3d409 411->419 420 6d3d2f9-6d3d30d 411->420 412->411 414->415 417 6d3d2c1 415->417 418 6d3d2c6-6d3d2c9 415->418 417->418 418->325 418->403 419->378 420->378 439 6d3d313-6d3d325 420->439 445 6d3da88 427->445 428->427 453 6d3d327-6d3d32d 439->453 454 6d3d349-6d3d34b 439->454 445->445 457 6d3d331-6d3d33d 453->457 458 6d3d32f 453->458 459 6d3d355-6d3d361 454->459 462 6d3d33f-6d3d347 457->462 458->462 470 6d3d363-6d3d36d 459->470 471 6d3d36f 459->471 462->459 473 6d3d374-6d3d376 470->473 471->473 473->378 475 6d3d37c-6d3d398 call 6d36590 473->475 484 6d3d3a7-6d3d3b3 475->484 485 6d3d39a-6d3d39f 475->485 484->419 486 6d3d3b5-6d3d402 484->486 485->484 486->378 539 6d3d721-6d3d726 538->539 540 6d3d72e-6d3d737 538->540 539->540 540->344 541 6d3d73d-6d3d750 540->541 543 6d3d756-6d3d75c 541->543 544 6d3d92a-6d3d934 541->544 545 6d3d76b-6d3d774 543->545 546 6d3d75e-6d3d763 543->546 544->537 544->538 545->344 547 6d3d77a-6d3d79b 545->547 546->545 550 6d3d7aa-6d3d7b3 547->550 551 6d3d79d-6d3d7a2 547->551 550->344 552 6d3d7b9-6d3d7d6 550->552 551->550 552->544 555 6d3d7dc-6d3d7e2 552->555 555->344 556 6d3d7e8-6d3d801 555->556 558 6d3d807-6d3d82e 556->558 559 6d3d91d-6d3d924 556->559 558->344 562 6d3d834-6d3d83e 558->562 559->544 559->555 562->344 563 6d3d844-6d3d85b 562->563 565 6d3d86a-6d3d885 563->565 566 6d3d85d-6d3d868 563->566 565->559 571 6d3d88b-6d3d8a4 call 6d36590 565->571 566->565 575 6d3d8b3-6d3d8bc 571->575 576 6d3d8a6-6d3d8ab 571->576 575->344 577 6d3d8c2-6d3d916 575->577 576->575 577->559 584->396 585->396
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq
                                                                                                            • API String ID: 0-837900676
                                                                                                            • Opcode ID: cb48218d741951ffec4a1505e2d101c071f5f9bbbc721403867690f5048fa44c
                                                                                                            • Instruction ID: 61ce35f1427cd9575ccb9432af9dca7c1989234ba2ea20798c7277d9b41c9cd0
                                                                                                            • Opcode Fuzzy Hash: cb48218d741951ffec4a1505e2d101c071f5f9bbbc721403867690f5048fa44c
                                                                                                            • Instruction Fuzzy Hash: 9A622E70A00216CFCB55EF68D590A5EB7B2FF84300F208969D405AF369DB79ED86CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 586 6d34b50-6d34b74 587 6d34b76-6d34b79 586->587 588 6d35258-6d3525b 587->588 589 6d34b7f-6d34c77 587->589 590 6d3525d-6d35277 588->590 591 6d3527c-6d3527e 588->591 609 6d34cfa-6d34d01 589->609 610 6d34c7d-6d34cc5 589->610 590->591 593 6d35280 591->593 594 6d35285-6d35288 591->594 593->594 594->587 596 6d3528e-6d3529b 594->596 611 6d34d07-6d34d77 609->611 612 6d34d85-6d34d8e 609->612 631 6d34cca call 6d35408 610->631 632 6d34cca call 6d353f8 610->632 629 6d34d82 611->629 630 6d34d79 611->630 612->596 623 6d34cd0-6d34cec 626 6d34cf7 623->626 627 6d34cee 623->627 626->609 627->626 629->612 630->629 631->623 632->623
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: fkq$XPkq$\Okq
                                                                                                            • API String ID: 0-673657909
                                                                                                            • Opcode ID: c0786d8cb43a5f8d971754b013f2620526d9cb45d388c9263150377baa370d92
                                                                                                            • Instruction ID: baaedb50d6e605cc1129316e6998e70eaea09406888cd1e7ec11c2314971178c
                                                                                                            • Opcode Fuzzy Hash: c0786d8cb43a5f8d971754b013f2620526d9cb45d388c9263150377baa370d92
                                                                                                            • Instruction Fuzzy Hash: 55616F70E002199FEB549FA5D8547AEBAF6FF88700F20842AD505EB394DF799C45CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1629 6d3912f-6d3915d 1630 6d3915f-6d39162 1629->1630 1631 6d39a20-6d39a23 1630->1631 1632 6d39168-6d3917d 1630->1632 1633 6d39a25-6d39a44 1631->1633 1634 6d39a49-6d39a4b 1631->1634 1639 6d39195-6d391ab 1632->1639 1640 6d3917f-6d39185 1632->1640 1633->1634 1636 6d39a52-6d39a55 1634->1636 1637 6d39a4d 1634->1637 1636->1630 1641 6d39a5b-6d39a65 1636->1641 1637->1636 1646 6d391b6-6d391b8 1639->1646 1642 6d39187 1640->1642 1643 6d39189-6d3918b 1640->1643 1642->1639 1643->1639 1647 6d391d0-6d39241 1646->1647 1648 6d391ba-6d391c0 1646->1648 1659 6d39243-6d39266 1647->1659 1660 6d3926d-6d39289 1647->1660 1649 6d391c2 1648->1649 1650 6d391c4-6d391c6 1648->1650 1649->1647 1650->1647 1659->1660 1665 6d392b5-6d392d0 1660->1665 1666 6d3928b-6d392ae 1660->1666 1671 6d392d2-6d392f4 1665->1671 1672 6d392fb-6d39316 1665->1672 1666->1665 1671->1672 1677 6d3933b-6d39349 1672->1677 1678 6d39318-6d39334 1672->1678 1679 6d3934b-6d39354 1677->1679 1680 6d39359-6d393d3 1677->1680 1678->1677 1679->1641 1686 6d39420-6d39435 1680->1686 1687 6d393d5-6d393f3 1680->1687 1686->1631 1691 6d393f5-6d39404 1687->1691 1692 6d3940f-6d3941e 1687->1692 1691->1692 1692->1686 1692->1687
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq
                                                                                                            • API String ID: 0-2537786760
                                                                                                            • Opcode ID: c105b103fedaf50eec95d69cf7e4266c9816bf2361901c615b813aabaaef0e5e
                                                                                                            • Instruction ID: 2bbae13b8a730b4f357fe9c5c3af8413217d7a76722310f6152b9ecd97f33b3f
                                                                                                            • Opcode Fuzzy Hash: c105b103fedaf50eec95d69cf7e4266c9816bf2361901c615b813aabaaef0e5e
                                                                                                            • Instruction Fuzzy Hash: 07516130F001169FDB54DB75DAA0B6E73F6FB88210F508429C50AEB398EB75DC429B90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1695 16deb38-16deb40 1696 16deaff-16deb18 call 16deb38 1695->1696 1697 16deb42-16deb53 1695->1697 1700 16deb1e-16deb22 1696->1700 1698 16deb7d-16deb93 1697->1698 1699 16deb55-16deb7c 1697->1699 1724 16deb95 call 16deb38 1698->1724 1725 16deb95 call 16dec20 1698->1725 1701 16deb2b-16deb2e 1700->1701 1702 16deb24-16deb29 1700->1702 1705 16deb31-16deb33 1701->1705 1702->1705 1706 16deb9a-16deb9c 1707 16deb9e-16deba1 1706->1707 1708 16deba2-16dec01 1706->1708 1715 16dec07-16dec94 GlobalMemoryStatusEx 1708->1715 1716 16dec03-16dec06 1708->1716 1719 16dec9d-16decc5 1715->1719 1720 16dec96-16dec9c 1715->1720 1720->1719 1724->1706 1725->1706
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2923908091.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_16d0000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1a9ebe9dcb3f2c90bddaf85e30e8dc9fc862ccb73d5c4c05228f5e592275ec60
                                                                                                            • Instruction ID: 29a00bf1fcfb3a6ff6111660af3b82f593e58679f25f62dd9eb698c0838e7f7c
                                                                                                            • Opcode Fuzzy Hash: 1a9ebe9dcb3f2c90bddaf85e30e8dc9fc862ccb73d5c4c05228f5e592275ec60
                                                                                                            • Instruction Fuzzy Hash: 82516772D013998FCB14CF69D8446EEBFF1AF89210F1985ABD508EB351DB34A945CBA0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1726 16dec20-16dec94 GlobalMemoryStatusEx 1728 16dec9d-16decc5 1726->1728 1729 16dec96-16dec9c 1726->1729 1729->1728
                                                                                                            APIs
                                                                                                            • GlobalMemoryStatusEx.KERNELBASE ref: 016DEC87
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2923908091.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_16d0000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: GlobalMemoryStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 1890195054-0
                                                                                                            • Opcode ID: c1cd2eca89bd4a5641f89911448fec4215a99069d8bf7d5c9cbf4c6b676388fc
                                                                                                            • Instruction ID: 90e3ddefeb1fa363d03ea4f5f35d22f71dfb769a5a9833f4956014364cfa7b61
                                                                                                            • Opcode Fuzzy Hash: c1cd2eca89bd4a5641f89911448fec4215a99069d8bf7d5c9cbf4c6b676388fc
                                                                                                            • Instruction Fuzzy Hash: 0E11F3B1C0065A9BDB10CF9AC945BDEFBF4AF48324F14816AD918B7240D379A944CFA5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: XPkq
                                                                                                            • API String ID: 0-3796509991
                                                                                                            • Opcode ID: a27914cba73bb33cd016b24361453ade3597b590668b9349fb22a64c9adae922
                                                                                                            • Instruction ID: 67fa19233f915b9e93cbdfbc0bcb71f54b64196179575c5487a11435a5d7b00d
                                                                                                            • Opcode Fuzzy Hash: a27914cba73bb33cd016b24361453ade3597b590668b9349fb22a64c9adae922
                                                                                                            • Instruction Fuzzy Hash: D4416F70F002199FDB549FA5C854BAEBBF6FF88300F20852AE505AB3A5DB759C45CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: XPkq
                                                                                                            • API String ID: 0-3796509991
                                                                                                            • Opcode ID: 12867b5fdf47d10c1f23b7e0676cd1517ddace289891e2b650b005ab6dba9aff
                                                                                                            • Instruction ID: 51714a891eaeea528527f0e8bbdd756c8db5528867b3b2f555e303198e8215ea
                                                                                                            • Opcode Fuzzy Hash: 12867b5fdf47d10c1f23b7e0676cd1517ddace289891e2b650b005ab6dba9aff
                                                                                                            • Instruction Fuzzy Hash: 2B414C70B002199FDB54DFA9C854BAEBBF2FF88700F20852AD505EB3A5DA799C45CB50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: 3e592ffe22ffa2598d126bcb09d7d3cd7f01bbcb78a9c03c9872e2972169fc84
                                                                                                            • Instruction ID: b83855caeb0866833dbd1b0f9e1d36e7ccdb3dcffbb6e879711ad5c9a595b962
                                                                                                            • Opcode Fuzzy Hash: 3e592ffe22ffa2598d126bcb09d7d3cd7f01bbcb78a9c03c9872e2972169fc84
                                                                                                            • Instruction Fuzzy Hash: AA418E70E102199FDB64DFA5D58069EBBB7FF85300F204929E806EB244EB74E846CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: 759b5fc388cfb270d54eeea50082328c4686a0f19dec2110c309364b038524cf
                                                                                                            • Instruction ID: 4afae1d72b075c40621f178621db13634eabf453da59d4985fc7508aaabafb85
                                                                                                            • Opcode Fuzzy Hash: 759b5fc388cfb270d54eeea50082328c4686a0f19dec2110c309364b038524cf
                                                                                                            • Instruction Fuzzy Hash: D6419D70E102159FDB65DF65D88069EBBB3AF85200F14452AE806EB254EB74E852CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: 4fb5bc0bd593961d627d770abb116ab58d8e866bc09f573db2acdb8d8a6772e1
                                                                                                            • Instruction ID: a38c9a86cde5b747e6f3ded4eadcaae5d39a45ed4bd54ee7ce4fbea503dd6ccc
                                                                                                            • Opcode Fuzzy Hash: 4fb5bc0bd593961d627d770abb116ab58d8e866bc09f573db2acdb8d8a6772e1
                                                                                                            • Instruction Fuzzy Hash: 6E311034F102219FDB689B74DA546AE3AB2EF89300F10442CD402EB399EE39DD41C7E5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PHfq
                                                                                                            • API String ID: 0-2154135885
                                                                                                            • Opcode ID: ff9db7d0314393ecc587ce9728fafbff24666b5a3a76500af5ecec96f6d4a3f6
                                                                                                            • Instruction ID: 726fbbf8c801dfe1797aa9cf72215d00861924453084447478b0b68a9607f252
                                                                                                            • Opcode Fuzzy Hash: ff9db7d0314393ecc587ce9728fafbff24666b5a3a76500af5ecec96f6d4a3f6
                                                                                                            • Instruction Fuzzy Hash: 1F31FE34F102259FDB689B74DA5466E3BB2AF89300F20842CD402EB398EE39DD41C7E1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq
                                                                                                            • API String ID: 0-12477121
                                                                                                            • Opcode ID: 58680126d84c52b8bb47d7a9ed2dc982a22c586b338cbec632d5ef7ef8e6c449
                                                                                                            • Instruction ID: 6e126090ffda960a62e9e1ea2bc6687f1367c57b89e1bb3dcc3c467ba1d4294e
                                                                                                            • Opcode Fuzzy Hash: 58680126d84c52b8bb47d7a9ed2dc982a22c586b338cbec632d5ef7ef8e6c449
                                                                                                            • Instruction Fuzzy Hash: 53F0ED32F04220DFEF649F82EA802B9B3B4EB40251F540076EE41E3390C739CA15EA91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f3d03101a063fe57edb137ff9e0ed74e75289eeebeff5eb75f07ea4189759b9a
                                                                                                            • Instruction ID: eeebad3136fa5a29a670f45118805d98892f1fb722167d23065dfcf682c43aeb
                                                                                                            • Opcode Fuzzy Hash: f3d03101a063fe57edb137ff9e0ed74e75289eeebeff5eb75f07ea4189759b9a
                                                                                                            • Instruction Fuzzy Hash: A4E1C371F002258FDF64DFA5D5806AEB7B2FF89314F248069D845AB394DB359C86CBA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 77eb54a6c365482a6d134c0abcbc3c2bd2cd6c9d61f80f34777b96f629f5e540
                                                                                                            • Instruction ID: 9f5ce3e2368e846bdb172b96c8a35e84768ae4d40b4e7ea60636cd826b29b9a8
                                                                                                            • Opcode Fuzzy Hash: 77eb54a6c365482a6d134c0abcbc3c2bd2cd6c9d61f80f34777b96f629f5e540
                                                                                                            • Instruction Fuzzy Hash: F5B14C70E102298FDBA4CF68D580BADB7B1EB59310F24856BE455DB351CA74DC81CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7382a21e17c022f23bf9a2ac66989f0b744074baeb8567be74c5b32319123cc0
                                                                                                            • Instruction ID: b7f84b28f2eb89e2b0f4a3cab271bbe0fd6ccff83bb5ab30b016086ef1f777da
                                                                                                            • Opcode Fuzzy Hash: 7382a21e17c022f23bf9a2ac66989f0b744074baeb8567be74c5b32319123cc0
                                                                                                            • Instruction Fuzzy Hash: 24A15A74B00624DFCB64DB69D584A6DB7F2FF84314F548869E40AAB350DB76EC81CB84
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1b0e799a574e22144f4b1072525f6b4946d8b0db3507070fe1c54ecbb1219989
                                                                                                            • Instruction ID: ac00fc72686efce9e8f59126cdcc655b29b7b03a737eaa46c60eaf793917a180
                                                                                                            • Opcode Fuzzy Hash: 1b0e799a574e22144f4b1072525f6b4946d8b0db3507070fe1c54ecbb1219989
                                                                                                            • Instruction Fuzzy Hash: 7261A072F001225FDB649B6ECD8066FBAE7AFD4210B154439D80EDB364DEA6ED0287D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: abe7dc5ec776a1c9f05733ca49686cfb24cb6ebbbc10f271de776c6a88a57947
                                                                                                            • Instruction ID: 2fa31d24c7bba45cdc3a9b888f705c6b775bf8fda7dcce3e6c53374116a79383
                                                                                                            • Opcode Fuzzy Hash: abe7dc5ec776a1c9f05733ca49686cfb24cb6ebbbc10f271de776c6a88a57947
                                                                                                            • Instruction Fuzzy Hash: 39817B70E002199FCB54DFA9D980A9EBBF6FF88300F24846AD405EB355DA74EC46CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: be28a8f9171959aa107cf79216c61bff5717a7608e7a2624aa6bb0b1add4bb46
                                                                                                            • Instruction ID: d0fdc7b1ca765dd524c9c321698c47bf4d3375c2a42894e1ab27c0e551280273
                                                                                                            • Opcode Fuzzy Hash: be28a8f9171959aa107cf79216c61bff5717a7608e7a2624aa6bb0b1add4bb46
                                                                                                            • Instruction Fuzzy Hash: C6916F74E0021A8FDF60CF64C890B9DB7B1FF89300F208699D449BB295DB74AA85CF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 68d5449c8f61870246ed899e51c3bdb19ffc1eca1b273df10718090859d949a9
                                                                                                            • Instruction ID: 6cbb6f32a398a569929f50e6dd272a8f9f3aba34c8604c45eec1503708482ff4
                                                                                                            • Opcode Fuzzy Hash: 68d5449c8f61870246ed899e51c3bdb19ffc1eca1b273df10718090859d949a9
                                                                                                            • Instruction Fuzzy Hash: A4811C34B102159BDB54DFA9D65476EB7F2EF89300F108429D40AEB358EB79DC828B91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0d2da030d844aa3641b6173472d1eff94c691c8c849bdf531c97a660e9fa4cac
                                                                                                            • Instruction ID: 94def63ba35803380e12424da39dc6f595b68f7c24a48fd41534b03700af7f14
                                                                                                            • Opcode Fuzzy Hash: 0d2da030d844aa3641b6173472d1eff94c691c8c849bdf531c97a660e9fa4cac
                                                                                                            • Instruction Fuzzy Hash: 52813D30F102169BDB54DFA9D65476EB7F2EF89300F108529D40AEB358EB79DC428B91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3b3b68cf05ce2027853b14b7d8187f76a237c30e1f020c2793c90b7eb23f148b
                                                                                                            • Instruction ID: 26df736a733e82f9057f0682d24d128bf599da71f8f50f1f0843153ae10540f8
                                                                                                            • Opcode Fuzzy Hash: 3b3b68cf05ce2027853b14b7d8187f76a237c30e1f020c2793c90b7eb23f148b
                                                                                                            • Instruction Fuzzy Hash: 57915E74E1021A8BDF60DF68C880B9DB7B1FF89300F208699D549BB355DB74AA85CF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9877ad7319135b225f901c6419efa6d3f10eeb9e482f30310bd1ee62cc9b361a
                                                                                                            • Instruction ID: 6f4668270c2cea822d2fd3606c276a0d885cbdccd9a0b7685fbdf27428cc50d3
                                                                                                            • Opcode Fuzzy Hash: 9877ad7319135b225f901c6419efa6d3f10eeb9e482f30310bd1ee62cc9b361a
                                                                                                            • Instruction Fuzzy Hash: 04713B70E002199FCB54DFA9D980A9EBBF6FF88300F24852AE405EB255DB74EC46CB51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a2fb0a9ad6b66529cf1428b940618c2455853b971837a8a56b1fe285eb0b6919
                                                                                                            • Instruction ID: a1029600e93ad2db3cf0dafffcf5c8007bf146b6acb20134185d1280f966140e
                                                                                                            • Opcode Fuzzy Hash: a2fb0a9ad6b66529cf1428b940618c2455853b971837a8a56b1fe285eb0b6919
                                                                                                            • Instruction Fuzzy Hash: 1E710970E002199FDB54DFA9D980A9EBBF6FF88300F14842AE415EB355DA74EC46CB51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ae0f5a7e207eaba3942d002619af9709dba41dbb5cfcaaa158f07edc141a9772
                                                                                                            • Instruction ID: ed48ded89f88e093fe8fddd6bc81bcfac48000c68b16efdae765c4c0e57a8121
                                                                                                            • Opcode Fuzzy Hash: ae0f5a7e207eaba3942d002619af9709dba41dbb5cfcaaa158f07edc141a9772
                                                                                                            • Instruction Fuzzy Hash: 4351D671E00129DFCB54AFB8E5886AEBBB2FF88311F10487AE106E7361DB359955C790
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6049888d1c995319004353a075e1d5831be9afda5c305197c33a60389664f4b6
                                                                                                            • Instruction ID: ccb392c2940a4bd7b9fd267c2fd93daac1074fe280ef0e0a2ef1fd625cd5fef9
                                                                                                            • Opcode Fuzzy Hash: 6049888d1c995319004353a075e1d5831be9afda5c305197c33a60389664f4b6
                                                                                                            • Instruction Fuzzy Hash: 475195B0F202289BDF645BF8D894B6F365AD789310F20443AE64AD73D4CE6CCC4193A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 658f067218b107b5efd8935a29cc22877a06525090a7f809b73ccf4e308feee0
                                                                                                            • Instruction ID: 52ab768a293edcd6cab698e783667506c744ef453d99dee630d5d4fc5c72cb49
                                                                                                            • Opcode Fuzzy Hash: 658f067218b107b5efd8935a29cc22877a06525090a7f809b73ccf4e308feee0
                                                                                                            • Instruction Fuzzy Hash: 645141B0F202289BEF645BFCD894B6E365AD789750F20443AE64AD73D4CE6CCC4157A1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 693a97983bc140439ad8516b102e012e0151b5425f84c0b854539a11f2d48f15
                                                                                                            • Instruction ID: 07ace452105811e1921074fdff8bd86e878e4f183f104e26bc8e51ced39fe243
                                                                                                            • Opcode Fuzzy Hash: 693a97983bc140439ad8516b102e012e0151b5425f84c0b854539a11f2d48f15
                                                                                                            • Instruction Fuzzy Hash: 3C51B275E042258FDF708F69E5D077EBBB2FB45310F24886AE45ADB281C635E881CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3c05b30147489b1c482cce828b1e0a962fb6677f535f1bc07c2e8a51d0d72758
                                                                                                            • Instruction ID: c874d202851e0f981616255ff375e2dd962ba099f346910e230527c3fed0e7de
                                                                                                            • Opcode Fuzzy Hash: 3c05b30147489b1c482cce828b1e0a962fb6677f535f1bc07c2e8a51d0d72758
                                                                                                            • Instruction Fuzzy Hash: 5C517C71B112299FCB54EF78D88099EB7B2FB89314F208969E406AB355DB35EC41CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b6da168df76f9b32a699af6f5a83cdf4f3fb907a7fadebe76333a46aa840865a
                                                                                                            • Instruction ID: 08b8dc9c2c9357d9b336372e8aea545e60c46431f94dcd1bf035937dee4efed6
                                                                                                            • Opcode Fuzzy Hash: b6da168df76f9b32a699af6f5a83cdf4f3fb907a7fadebe76333a46aa840865a
                                                                                                            • Instruction Fuzzy Hash: C6413A71E006199BDF60CFA9E880AAFFBB2FB88310F10492AE116D7650D731E9558B91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 77bc7f75f5a3ead783b3c5e17577f29e7038be65b8d723315b7ba462f3cedeb2
                                                                                                            • Instruction ID: d9dc5e9fd5447f4f17c6f3c9c4b79937c16566ba4b03d9d395da1e1b75760947
                                                                                                            • Opcode Fuzzy Hash: 77bc7f75f5a3ead783b3c5e17577f29e7038be65b8d723315b7ba462f3cedeb2
                                                                                                            • Instruction Fuzzy Hash: D431B870E1021A9FCF14DF68D99069EBBB2FF85304F104929E405EB754DB75A946CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 69f775f65dac41038df4ee7ba1930fb6cd66300e5857bb3b194703e9a9cf40ec
                                                                                                            • Instruction ID: 33c67e61d637c7f8ee2e9e2189ce967d104be8fcec147bc0831327ea16c8824b
                                                                                                            • Opcode Fuzzy Hash: 69f775f65dac41038df4ee7ba1930fb6cd66300e5857bb3b194703e9a9cf40ec
                                                                                                            • Instruction Fuzzy Hash: BE319E35E102159BCB58CF64D99469EF7B2FF89300F10C429E906E7354DB71AD46CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 52827ebb616752aa24c917af3933334b08ff49d9bdfefbdf3692ec088f643fc3
                                                                                                            • Instruction ID: 7fe36daadecd8910202944d977376d55ba26d1c9603c8e39649d49a08913dbb1
                                                                                                            • Opcode Fuzzy Hash: 52827ebb616752aa24c917af3933334b08ff49d9bdfefbdf3692ec088f643fc3
                                                                                                            • Instruction Fuzzy Hash: B631AD34E1021A9BCB18CF64D99469EF7B2FF89300F10C829E906E7354DB71AD82CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e710895e11b7c33a5c125b5f58311358a169733e3a4eacb27aa4d512d4b5fe88
                                                                                                            • Instruction ID: e471ee5d3c9aa195ad52937a52f2775c9feeb12fce7c10565cb7ce0985a0b553
                                                                                                            • Opcode Fuzzy Hash: e710895e11b7c33a5c125b5f58311358a169733e3a4eacb27aa4d512d4b5fe88
                                                                                                            • Instruction Fuzzy Hash: 7A219F75F00215AFDB50CF69EA80AEEBBF1EB48710F11802AE905E7350E735D8419BA4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ed154b9d33261071dc0dfa9b1f393118721ed1d03f83c8599c58c83debc70cb7
                                                                                                            • Instruction ID: a18415cc967433758ddb019de5a4b9e9c8527085ed8d4c03db58ca5585165216
                                                                                                            • Opcode Fuzzy Hash: ed154b9d33261071dc0dfa9b1f393118721ed1d03f83c8599c58c83debc70cb7
                                                                                                            • Instruction Fuzzy Hash: DF216075F006559FDB50CF69DA80AAEB7F2FB48710F118029EA05E7350E735DD418B94
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ab103f2a4d1c0842424707a34c7572ed5da5e87ee0e32ecd5d26192580949b2e
                                                                                                            • Instruction ID: 3c697f55ad4fb5b398707dd9c795761b966a8b0ac584d35d0842115c56aef9bc
                                                                                                            • Opcode Fuzzy Hash: ab103f2a4d1c0842424707a34c7572ed5da5e87ee0e32ecd5d26192580949b2e
                                                                                                            • Instruction Fuzzy Hash: 65219F71A007159FCB24CFA9DCC0AAFBBB2FF88300F14892DE15697650D730A95A8B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2923520495.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_143d000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 502255f24fc2b16c1d56b151a472afc47d76158f1193b9589408df8aaa0d7521
                                                                                                            • Instruction ID: c055d06025df0303146cb164e6d08fd11a3e2dc6f8ecfff426b2380f4c674de4
                                                                                                            • Opcode Fuzzy Hash: 502255f24fc2b16c1d56b151a472afc47d76158f1193b9589408df8aaa0d7521
                                                                                                            • Instruction Fuzzy Hash: 9D21F1B1904200DFCB15DF58D980B26FB75EBC8718F64C56AE90A4A2A2C336D447CA61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 71bd325b98829e429d40f3ddf49fa56df5ae4e525e18f1dccfabcd2ac742e5da
                                                                                                            • Instruction ID: 34cb47838b59bfdaccd405a2c4957a0e0feff224279dc005d968c4e99485d772
                                                                                                            • Opcode Fuzzy Hash: 71bd325b98829e429d40f3ddf49fa56df5ae4e525e18f1dccfabcd2ac742e5da
                                                                                                            • Instruction Fuzzy Hash: A821D230F11029DBCF94DB69F9506AEB7B2EB84310F248429E405EB354EB35DC418B94
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2923520495.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_143d000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: eca168f10ea25b3d10a8fa4b393bfb7654c0c9b27c2fe021171145a9c5125d4f
                                                                                                            • Instruction ID: dc9cef93898840358cf6275247122334ce403ed9da24b51b10359d37c4c7e311
                                                                                                            • Opcode Fuzzy Hash: eca168f10ea25b3d10a8fa4b393bfb7654c0c9b27c2fe021171145a9c5125d4f
                                                                                                            • Instruction Fuzzy Hash: EB216D755093C08FDB13CF64C990715BF71AB46214F29C5DBD8898F2A3C23A980ACB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cd4e47e443fe200910fb7e070b75c1cc42314573f262ea50ab4075be2808c5db
                                                                                                            • Instruction ID: 7dde10abf4384297498340f3e4dddb0bd48042a8ea78cd61f1bb2a69447b95ab
                                                                                                            • Opcode Fuzzy Hash: cd4e47e443fe200910fb7e070b75c1cc42314573f262ea50ab4075be2808c5db
                                                                                                            • Instruction Fuzzy Hash: 1511E131B105295BDF549669DA146AF73BAEBC8200F014039D406E7358EE24DC029BD0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f0bdc9a50ba74623245e37dc43d92a5f96b45c296ad84532bfe75623ddc51ac2
                                                                                                            • Instruction ID: 9f7b2a72130a4959b2736ab23190875584e1051b8eefed3221f8bc9c5049b515
                                                                                                            • Opcode Fuzzy Hash: f0bdc9a50ba74623245e37dc43d92a5f96b45c296ad84532bfe75623ddc51ac2
                                                                                                            • Instruction Fuzzy Hash: 3C01D471F002246BCB65873DE960A2F77D6EBCA620F148939F50AC7340D929DC0343D2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 76232256edb43927b5d1852e8e3817b3e8fbc9b33645789bcc2ac3644e72a6b3
                                                                                                            • Instruction ID: f2912ecc41b65a025235288916b410424a6f71f9423abfd8c67755b2f7598a7a
                                                                                                            • Opcode Fuzzy Hash: 76232256edb43927b5d1852e8e3817b3e8fbc9b33645789bcc2ac3644e72a6b3
                                                                                                            • Instruction Fuzzy Hash: 3221C2B5D01259AFCB00CF9AD984ADEFBB4FB48320F11852AE518B7350D374A954CFA4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b4450c1146a4440d29b9cc377af73b10a6b5571cd1c9b6c5645fa4da970b5871
                                                                                                            • Instruction ID: 0a961b4fb170de339b1cab3299aeb26f66286cf533cd48888359c98f08aea1dd
                                                                                                            • Opcode Fuzzy Hash: b4450c1146a4440d29b9cc377af73b10a6b5571cd1c9b6c5645fa4da970b5871
                                                                                                            • Instruction Fuzzy Hash: 9211A171E001699ECB94DFB9D9405DEF7B6EF88310F0185AAE505E7200EA319A84CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 53b5941842b7ef0e1f4df447057e8755c5c41248ffa486389c62c9186a332a06
                                                                                                            • Instruction ID: 04de094f08b84b754026f6e3553dae5b9155795f9f5a9c676f87248d6ccd63e3
                                                                                                            • Opcode Fuzzy Hash: 53b5941842b7ef0e1f4df447057e8755c5c41248ffa486389c62c9186a332a06
                                                                                                            • Instruction Fuzzy Hash: 6011C2B1D01259AFCB00CF9AD984ADEFBB8FB48320F10812AE518A7200C375A554CFA5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: baec5d1ed7f95bd0d0ef82c52162125a10c5e8a526f263bb3faa978f717eef6e
                                                                                                            • Instruction ID: b8b94c0234a36ee5b30b11acb3698ffba328cbc45c51399f1d02c9b9e0b11ec6
                                                                                                            • Opcode Fuzzy Hash: baec5d1ed7f95bd0d0ef82c52162125a10c5e8a526f263bb3faa978f717eef6e
                                                                                                            • Instruction Fuzzy Hash: B201D135B000211BDBA4A6ADE95472FA6DAEBC9721F10883AE10AD7365ED69DC4203E5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 16b6580204b447d1a543dac08fb46715c0c47ac608c19a2fee1160f5f9477eba
                                                                                                            • Instruction ID: 0088552c04787860eb8918f7e9528925712ba5cdd1d14007b03450e8a30de58c
                                                                                                            • Opcode Fuzzy Hash: 16b6580204b447d1a543dac08fb46715c0c47ac608c19a2fee1160f5f9477eba
                                                                                                            • Instruction Fuzzy Hash: F901F435B000211BDBA496ADE94472FF7DAEBC9721F10883DE10AD7365DD69EC420391
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cce4d01cee6dd750790f357b5167c465ebff8e2de99f572dfbde4878443770da
                                                                                                            • Instruction ID: 75e4fab43620d8b79565e86dd4516b340b04b90e10d9fcfddf0c22efa4fa7920
                                                                                                            • Opcode Fuzzy Hash: cce4d01cee6dd750790f357b5167c465ebff8e2de99f572dfbde4878443770da
                                                                                                            • Instruction Fuzzy Hash: E701D670B101205BCB60DBBCD950B6EB3D5E789760F148839E54BD7354EA26DC4287C0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 975b6c52130a3dfc47b125bb3750137818aaed1fff5b6afb11ce57e235869d1f
                                                                                                            • Instruction ID: 23cc20884144293955e52795033d336f35b9b3e2932f943a9419dcf918b2ffc3
                                                                                                            • Opcode Fuzzy Hash: 975b6c52130a3dfc47b125bb3750137818aaed1fff5b6afb11ce57e235869d1f
                                                                                                            • Instruction Fuzzy Hash: 8601AF76F001295BDBA5977CE890B2FB3D6EBC9620F208839E50AC7344DE65DC034391
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0430adbd2887de9cb861492721aa3dc8323b20bce030fd298382025c395c53cb
                                                                                                            • Instruction ID: 7f5f3ff8cf4e6cad32b676ee41a3c18a6ba510f00712e4aa8ca77ed9e33c7f32
                                                                                                            • Opcode Fuzzy Hash: 0430adbd2887de9cb861492721aa3dc8323b20bce030fd298382025c395c53cb
                                                                                                            • Instruction Fuzzy Hash: 2201D132F104265BDFA49669DE106EF73BBABC8611F06403AD506E7398EE64CC1297D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 17b9f9c3051361b74a73e124aa7ec55cdd52e60be8294775548b068c6712a53b
                                                                                                            • Instruction ID: 5ffe4f226735590230f932805dd1587308ff1f594c250b49bfb7a95d2958a84f
                                                                                                            • Opcode Fuzzy Hash: 17b9f9c3051361b74a73e124aa7ec55cdd52e60be8294775548b068c6712a53b
                                                                                                            • Instruction Fuzzy Hash: CE01A470B001205BCB64DBBCD950B2EB3D5EB89720F54883EE54BD7354DA36EC428781
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7ac88b3446ae4449a85f6fa8f2834e33133fe0e9a19239004d2493497c5da891
                                                                                                            • Instruction ID: fc19bebab0e8c94dd2981e30bfe4b9ffa8f8cb73f0bede4a10722341ce6a0462
                                                                                                            • Opcode Fuzzy Hash: 7ac88b3446ae4449a85f6fa8f2834e33133fe0e9a19239004d2493497c5da891
                                                                                                            • Instruction Fuzzy Hash: 18F0C232F244655BDF94C679EA607AF62BBEBC8611F05403AD506C7298EF24CD12A790
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7ab2d9dfcb50f58b72a471229450ae45ac9ec9a8630f613b414a9750b855b6a2
                                                                                                            • Instruction ID: e8514ae716024885946f5a9a1f064056e97f8d3f2e43d53eaf31c7edc94cc40e
                                                                                                            • Opcode Fuzzy Hash: 7ab2d9dfcb50f58b72a471229450ae45ac9ec9a8630f613b414a9750b855b6a2
                                                                                                            • Instruction Fuzzy Hash: E7018176F21135ABCB549F69E940A9EB776FB85314F11443AE801FB380DB35AD058B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e9caf81b6300579f79e1f06ba251c1c819ef966705c7550dbf258e8d00d53e58
                                                                                                            • Instruction ID: 4d4ccb0617238860966190747b2e522805de0194bcdae9f04f117efc61481a24
                                                                                                            • Opcode Fuzzy Hash: e9caf81b6300579f79e1f06ba251c1c819ef966705c7550dbf258e8d00d53e58
                                                                                                            • Instruction Fuzzy Hash: 4BE08CB1E14168BBDF90CFB0CA5475A73AAD749214F3288A5D408EB200E136CE028390
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: aa976699a50b98a0a6b50c08d3026a88d70fc42e5459dfcadbf44bb0d2ea6d04
                                                                                                            • Instruction ID: b56122b833f5e01e7523ecd6fa0c61609babac7f87556badfd056f294df368e6
                                                                                                            • Opcode Fuzzy Hash: aa976699a50b98a0a6b50c08d3026a88d70fc42e5459dfcadbf44bb0d2ea6d04
                                                                                                            • Instruction Fuzzy Hash: E0E0C270E14258BBDF50CFB0CA4575A73EDD705204F2088A4D408CB201E137DE018380
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 00b04abb292eb4afc3be61d29966362f3d5543366f4e5350165276087ce19722
                                                                                                            • Instruction ID: 308a768b4a5eec93c74487cc020e4d98d54b9ba4030f76a7a00edd24d91c69e7
                                                                                                            • Opcode Fuzzy Hash: 00b04abb292eb4afc3be61d29966362f3d5543366f4e5350165276087ce19722
                                                                                                            • Instruction Fuzzy Hash: F8B01243D8E3E416D5D197647D25475370FD7C2101F450AC25848CB295E50BDC30C1B2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1462074617
                                                                                                            • Opcode ID: 7760b2b827a21ff074dd35f8d3f62d2be41d85468d97edac425cf247cfffacb9
                                                                                                            • Instruction ID: b8f66bded05f097e6cd9ac561cc5aff3b17f6d2f41fc9b77c1d3b1dc8f03d592
                                                                                                            • Opcode Fuzzy Hash: 7760b2b827a21ff074dd35f8d3f62d2be41d85468d97edac425cf247cfffacb9
                                                                                                            • Instruction Fuzzy Hash: 5A122C70E01629CFDB64DF69C994A9EB7B2FF88300F208569D409AB354DB309D85CF95
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-3929485403
                                                                                                            • Opcode ID: d1f4a625df5e074cb49ca03a81864d78696274dd40cf1189e36089848193bde9
                                                                                                            • Instruction ID: 89a2b206aaef53173a285b7899541519eee26e257ec3d0a7a63ed2abff260643
                                                                                                            • Opcode Fuzzy Hash: d1f4a625df5e074cb49ca03a81864d78696274dd40cf1189e36089848193bde9
                                                                                                            • Instruction Fuzzy Hash: 04919E74F00229DFDB64DF65DA94B6E77B6EF44300F188529E481AB290DB79DC81CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: .5~q$$fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1301248726
                                                                                                            • Opcode ID: a9506dfbacf3f60c4782e2c91ef5634f7ab27a4fe05b5b3e96fda65304a64313
                                                                                                            • Instruction ID: 03daf5f174c7c21e0abb7ccc22b5b76d6ff83a168162964d519ce6a8c4721e65
                                                                                                            • Opcode Fuzzy Hash: a9506dfbacf3f60c4782e2c91ef5634f7ab27a4fe05b5b3e96fda65304a64313
                                                                                                            • Instruction Fuzzy Hash: 36F16C70A01219DFDB58DFA5C990A6EB7B3FF84300F248569D4059B3A4DB35EC82CB99
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-1582559945
                                                                                                            • Opcode ID: 7942e12779b28ba3aa89f6009ef4bcb87d97aa8a16087f170152c377e6ef22bf
                                                                                                            • Instruction ID: f6460219f2415378ccb6ac158095b1a4ef9b70c5907d046251b5a55bc4eae561
                                                                                                            • Opcode Fuzzy Hash: 7942e12779b28ba3aa89f6009ef4bcb87d97aa8a16087f170152c377e6ef22bf
                                                                                                            • Instruction Fuzzy Hash: EC718F71E102298FDB68CFA9D9906AEB7B2FF95300B10856AD4069F254DF70ED45CB81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-2113499236
                                                                                                            • Opcode ID: c27bd63ec75cd8c96a281efdfaa994aad7927ad402ba6a83e308ab777f5d94f4
                                                                                                            • Instruction ID: 9fca760e2a7b19eb5a10db2e733ab269ea3ac359473b6c2d8b0e885f060858ac
                                                                                                            • Opcode Fuzzy Hash: c27bd63ec75cd8c96a281efdfaa994aad7927ad402ba6a83e308ab777f5d94f4
                                                                                                            • Instruction Fuzzy Hash: 93B12B70E112298BDB64DFA5C9906AEB7B3FF88300F248429E405DB394DB75DC82DB91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: LRfq$LRfq$$fq$$fq
                                                                                                            • API String ID: 0-1810675050
                                                                                                            • Opcode ID: 2cf54249c0ecae2c29d688decb444acdb38f9dbdbc5274e658a6c3763aaebe45
                                                                                                            • Instruction ID: cb48cb3edd4d70dc4ffb2d3416bd4443864832ab08328d1a91de576ac0d01883
                                                                                                            • Opcode Fuzzy Hash: 2cf54249c0ecae2c29d688decb444acdb38f9dbdbc5274e658a6c3763aaebe45
                                                                                                            • Instruction Fuzzy Hash: 51519130B002119FDB58DF69D980A6AB7F6FF88700F14856DE402EB3A5DA35EC41DB91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000D.00000002.2935070986.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_13_2_6d30000_lxZwKFTCWa.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $fq$$fq$$fq$$fq
                                                                                                            • API String ID: 0-2113499236
                                                                                                            • Opcode ID: b3964d5068e495aa56f30f4b4c99fbd9f61b920e7710212d16d308d55145e89a
                                                                                                            • Instruction ID: 1669b07dd5ea70c62ac02eaee2154a2fb745bbcfa9cc6267640bf07674a036c8
                                                                                                            • Opcode Fuzzy Hash: b3964d5068e495aa56f30f4b4c99fbd9f61b920e7710212d16d308d55145e89a
                                                                                                            • Instruction Fuzzy Hash: E651B234F112159FCF65DB64E9806AEB7B2FB88200F18852DD841EB354EB35DC42CB91