Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dhl Express Shipping Docs .pdf.exe

Overview

General Information

Sample name:Dhl Express Shipping Docs .pdf.exe
Analysis ID:1430785
MD5:e7d52516ca8bcf4e8bcaf71a36a88300
SHA1:d5a7eaad95ab6d4e492b128db0cf550c34170c90
SHA256:8df5ecbc8ea978c98c9c3a0918fe9ee233f169ee9e3d38855b7da8fc96aad8dc
Tags:DHLexeFormbook
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Dhl Express Shipping Docs .pdf.exe (PID: 7060 cmdline: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe" MD5: E7D52516CA8BCF4E8BCAF71A36A88300)
    • powershell.exe (PID: 6980 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6836 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7504 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6296 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7292 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7300 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7308 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • emaGqYHYeYNHas.exe (PID: 7404 cmdline: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe MD5: E7D52516CA8BCF4E8BCAF71A36A88300)
    • schtasks.exe (PID: 7672 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7724 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7732 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7740 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "director@koddy.co.in", "Password": "u(!IUDW7"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1431070123.0000000002B7F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000012.00000002.2609746295.0000000002932000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x32313:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32385:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3240f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x324a1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3250b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3257d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32613:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x326a3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 13 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine|base64offset|contains: kz, Image: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, NewProcessName: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, OriginalFileName: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ProcessId: 7060, ProcessName: Dhl Express Shipping Docs .pdf.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ParentImage: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentProcessId: 7060, ParentProcessName: Dhl Express Shipping Docs .pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ProcessId: 6980, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ParentImage: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentProcessId: 7060, ParentProcessName: Dhl Express Shipping Docs .pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ProcessId: 6980, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe, ParentImage: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe, ParentProcessId: 7404, ParentProcessName: emaGqYHYeYNHas.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp", ProcessId: 7672, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.223, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7308, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49709
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ParentImage: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentProcessId: 7060, ParentProcessName: Dhl Express Shipping Docs .pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", ProcessId: 6296, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ParentImage: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentProcessId: 7060, ParentProcessName: Dhl Express Shipping Docs .pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ProcessId: 6980, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe", ParentImage: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe, ParentProcessId: 7060, ParentProcessName: Dhl Express Shipping Docs .pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp", ProcessId: 6296, ProcessName: schtasks.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Dhl Express Shipping Docs .pdf.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeAvira: detection malicious, Label: HEUR/AGEN.1309858
                    Source: 11.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "director@koddy.co.in", "Password": "u(!IUDW7"}
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeReversingLabs: Detection: 36%
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeVirustotal: Detection: 40%Perma Link
                    Source: Dhl Express Shipping Docs .pdf.exeVirustotal: Detection: 40%Perma Link
                    Source: Dhl Express Shipping Docs .pdf.exeReversingLabs: Detection: 36%
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeJoe Sandbox ML: detected
                    Source: Dhl Express Shipping Docs .pdf.exeJoe Sandbox ML: detected
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 4x nop then jmp 07A3208Ah0_2_07A321AC
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 4x nop then jmp 0985163Ah12_2_0985175C

                    Networking

                    barindex
                    Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.8:49709 -> 208.91.199.223:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.8:49709 -> 208.91.199.223:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: ip-api.com
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D70000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D70000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1426674890.0000000000F12000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D70000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1404824641.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1404824641.0000000003612000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, emaGqYHYeYNHas.exe, 0000000C.00000002.1446811774.0000000002FA2000.00000004.00000800.00020000.00000000.sdmp, emaGqYHYeYNHas.exe, 0000000C.00000002.1446811774.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    System Summary

                    barindex
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: Dhl Express Shipping Docs .pdf.exe, Book.csLarge array initialization: : array initializer size 554226
                    Source: Dhl Express Shipping Docs .pdf.exe, Form1.csLong String: Length: 129808
                    Source: initial sampleStatic PE information: Filename: Dhl Express Shipping Docs .pdf.exe
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_0326DFCC0_2_0326DFCC
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078BD4D80_2_078BD4D8
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078BE2C00_2_078BE2C0
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078B50110_2_078B5011
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078B30280_2_078B3028
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078B30380_2_078B3038
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078BBE300_2_078BBE30
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078BDDB00_2_078BDDB0
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078BB9F80_2_078BB9F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0111A8C811_2_0111A8C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0111EB6011_2_0111EB60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_01114AC011_2_01114AC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0111AD2011_2_0111AD20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_01113EA811_2_01113EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_011141F011_2_011141F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E65F811_2_063E65F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063EB23011_2_063EB230
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E236011_2_063E2360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E51B011_2_063E51B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063EC1A811_2_063EC1A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E7D8011_2_063E7D80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E76A011_2_063E76A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063EE3C011_2_063EE3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E004011_2_063E0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E58F011_2_063E58F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_063E000611_2_063E0006
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_02B4DFCC12_2_02B4DFCC
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0526118412_2_05261184
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0526000612_2_05260006
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0526004012_2_05260040
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_05261FF112_2_05261FF1
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973B9F812_2_0973B9F8
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_09730BA012_2_09730BA0
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_09730B9B12_2_09730B9B
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973DDB012_2_0973DDB0
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973DD9F12_2_0973DD9F
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973BE3012_2_0973BE30
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973303812_2_09733038
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973302812_2_09733028
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973E2C012_2_0973E2C0
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973E2B912_2_0973E2B9
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973D4D812_2_0973D4D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_02714AC018_2_02714AC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0271EB6018_2_0271EB60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0271A8C818_2_0271A8C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_02713EA818_2_02713EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0271AD2018_2_0271AD20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_027141F018_2_027141F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061DAB7418_2_061DAB74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061DC2F818_2_061DC2F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061DA85418_2_061DA854
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061DDEB018_2_061DDEB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F65F818_2_061F65F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061FB23018_2_061FB230
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F236018_2_061F2360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F51B018_2_061F51B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061FC1A818_2_061FC1A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F7D8018_2_061F7D80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F76A018_2_061F76A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061FE3C018_2_061FE3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F004018_2_061F0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F58F018_2_061F58F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061F000618_2_061F0006
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1413117517.000000000A690000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1404824641.0000000003381000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename181c5655-392f-449d-a50a-3258bb70d9df.exe4 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411646480.0000000007F37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerS, vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000000.1363495573.0000000001034000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameObtP.exeF vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1410498182.0000000005E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1403732762.000000000151E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1405794257.000000000502B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename181c5655-392f-449d-a50a-3258bb70d9df.exe4 vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exeBinary or memory string: OriginalFilenameObtP.exeF vs Dhl Express Shipping Docs .pdf.exe
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: emaGqYHYeYNHas.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, gFZLHtVi1cnGoMlI5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, gFZLHtVi1cnGoMlI5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, L91crkTO3pohiQSalL.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@27/15@2/2
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile created: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7180:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7680:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMutant created: \Sessions\1\BaseNamedObjects\IYXdPnPRUIEDkqCRQgkG
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB967.tmpJump to behavior
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Dhl Express Shipping Docs .pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Dhl Express Shipping Docs .pdf.exeVirustotal: Detection: 40%
                    Source: Dhl Express Shipping Docs .pdf.exeReversingLabs: Detection: 36%
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile read: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Dhl Express Shipping Docs .pdf.exe, Form1.cs.Net Code: InitializeComponent
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, L91crkTO3pohiQSalL.cs.Net Code: TxoauTJ0xogNZ27m00j System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, L91crkTO3pohiQSalL.cs.Net Code: TxoauTJ0xogNZ27m00j System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_078B479E pushfd ; iretd 0_2_078B479F
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeCode function: 0_2_07A34F75 push FFFFFF8Bh; iretd 0_2_07A34F77
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0973479E pushfd ; iretd 12_2_0973479F
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeCode function: 12_2_0985451D push FFFFFF8Bh; iretd 12_2_0985451F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_061D53E0 push es; ret 18_2_061D53F0
                    Source: Dhl Express Shipping Docs .pdf.exeStatic PE information: section name: .text entropy: 7.109679695826465
                    Source: emaGqYHYeYNHas.exe.0.drStatic PE information: section name: .text entropy: 7.109679695826465
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, SpLaMOR3l4FeepxgUP.csHigh entropy of concatenated method names: 'bEiUP2Axeo', 'sWJUo96Cul', 'SbBU2wGLnV', 'Px7Ui3ZV2c', 'dOrUeO8gD5', 'PwyUOGS75B', 'M5EUJv22Pn', 'MbVUyJ6tRH', 'SltUdIy4RL', 'uwBUlLqMJr'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, VkmGye69RAYTxLxc2O.csHigh entropy of concatenated method names: 'teFsdx1EM4', 'FnMsgUIqNJ', 'b2MsXCXEi0', 'zPws9Vfhkv', 'FJ6siwg2iG', 'Pi8sA9krXQ', 'TTQseaUY7j', 'M2AsO3mcbb', 'VPIsIUMuio', 'WcfsJDRLpT'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, MGZb7lH7pkEf94MkqI.csHigh entropy of concatenated method names: 'UCvk5dtpdw', 'SbLkEiPnVb', 'ToString', 'A0gkty6ieJ', 'yq7k71aFRC', 'sGhkr6Pblx', 'DtokwPBKF9', 'SaKkuhvBN4', 'RGskZ7XN9q', 'FdVkVSo6CS'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, L91crkTO3pohiQSalL.csHigh entropy of concatenated method names: 'snQRK16LYq', 'BIvRt3cUxP', 'zNZR7J5wIJ', 'x8eRrpk8bd', 'YrhRwnACcK', 'EWfRuaUndK', 'FxARZOYJ4s', 'u7VRVcaisG', 'yhwRMgTqmS', 'bA7R5OaMHZ'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, kpYgb9D6Ff7fSuWovH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'QkpmqQGXs9', 'YIvmxnoxVc', 'va5mzCCXtv', 'UaCR6B3BKe', 'ie0Raim06b', 'dIXRmquicH', 'i6aRR9fsOj', 'GKsEYAJ8UU7tT3LIDoN'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, aPihqT8BP7X01FASs8.csHigh entropy of concatenated method names: 'rG5ZfjVhIb', 'H8ZZBOto4S', 'uTmZFIhp5W', 'Xy2ZGebsLc', 'x6aZ309bjZ', 'evIZhV1PsZ', 'cr9ZCf1n6V', 'isxZPykJqG', 'tIGZopRDJh', 'PqwZN4Umkh'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, j1wTVNcYjWdZ0KBQ7U.csHigh entropy of concatenated method names: 'BCru1IpkjF', 'w5nuflNGDg', 'RW0uF5sKK6', 'zy8uG8vvAk', 'QrJuhhwdKU', 'dobuCxq21v', 'mBvuoj5LQi', 'Xj0uNdd2m0', 'VKZuy32CLqVGjDW0qKY', 'MaieSU2tbAUYMMiTSE0'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, wTgVfNuCI3uwOPGUST.csHigh entropy of concatenated method names: 'pnXWaSe4Iu', 'ObPWR1UYrd', 'OXSWYmLNdI', 'KkEWtdm9V8', 'JRJW7nQHA1', 'L8VWweWP0d', 'BiVWuCWTeu', 'mPqTpq40mF', 'mtBT0r0mYB', 'M6HTqVNwse'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, gkISpNzrNpOGGickBX.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nq2WULKJ4h', 'Sv4WsE9DVF', 'IG4WSXCYnU', 'nmYWkB9BeQ', 'V79WTStt9p', 'haTWWsdHtM', 'qsyWb5ruRL'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, w9mrUcoAIVkS8af7j1.csHigh entropy of concatenated method names: 'Dispose', 'ENnaqkRbsA', 'RsAmiFjqEu', 'jkDDDOJkvs', 'mxNaxGrqIk', 'RcHazgInEB', 'ProcessDialogKey', 'w76m60bhta', 'utSmaeO7St', 'qBGmm6xyAV'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, PatEWljIDc1m3P6XAa.csHigh entropy of concatenated method names: 'zb7k0vfSLY', 'NKlkxa2oNP', 'PKrT6h7CEu', 'K5VTaG6V7d', 'WZPklgqAUd', 'mBJkgje4kV', 'avLk4LwFJh', 'spkkXQ368n', 'RYxk9GyAEa', 'dg0kLZg63v'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, AvAgEHF7qrr70lpNOx.csHigh entropy of concatenated method names: 'NfGZtfoxRI', 'aZfZrKEaBJ', 'LA6ZuLutY5', 'pLSuxAe9CT', 'msduztIaEY', 'YmgZ6q1gB5', 'o3VZaZRgO1', 'p5pZm8DQun', 'eu2ZR1urOy', 'Nw4ZY26nBU'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, UajKYRILGVIbZJEpcb.csHigh entropy of concatenated method names: 'g5huKPCs5P', 'PIlu7dB7Dt', 'qjNuwb4O5u', 't6UuZAGnt8', 'H7ZuVNSfHC', 'Rp2wjace4a', 'GxTw8KxBte', 'pbdwpf0Gnm', 'Cksw0AKUF6', 'MjmwqcsE70'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, JfvSQw9dPmHZN4rpEr.csHigh entropy of concatenated method names: 'r9oFhXbn8', 'zVOGfZXDe', 'CuihkQN59', 'MZwCEWLLO', 'CFcobm0ix', 'oeYNvi18q', 'FEAWw1B04kjIymRxfk', 'atCqBinlfA46epT0uX', 'wCGTMrlkf', 'Jq3b4gWgp'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, q7S4syNbpmpA69hF6g.csHigh entropy of concatenated method names: 'ToString', 'N2FSlwRNH3', 'SuDSi2gGuB', 'WwASAEZ5f7', 'GlESekt0fZ', 'uc1SOQla3Y', 'wQMSIh9ged', 'oQTSJiQnLy', 'xdvSymR0ap', 'asyScdWgYW'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, f14LtGhlsArLGlCSZq.csHigh entropy of concatenated method names: 'CxPTt5IRhw', 'b6RT7kLaA5', 'obiTrAqCK5', 'C6pTwbhmZ2', 'G3STuIUSe4', 'DvPTZFD5Hv', 'cBLTVegGhB', 'fZyTMX1rdd', 'NsUT5XgPGx', 'nAGTES9vfV'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, QQ0ZQOfY6Ee2hmJYbs.csHigh entropy of concatenated method names: 'Ay0rG0j2Fs', 'bb0rhifsPc', 'SFkrPwLYa2', 'ocGrokRjvs', 'd5GrsC6JLK', 'N8VrSFvxym', 'GjArk3d0po', 'OXFrTANyDC', 'jv5rWaIR4q', 'OffrbUo70B'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, RE2ydl5EZwof1RDpK8.csHigh entropy of concatenated method names: 'N8RaZjYw6k', 'weUaVNdqa4', 'MJTa5C7JrG', 'WqWaEEUvs1', 'DQJasgOfbA', 'lbiaSjBmT9', 'MQaSfMrUtkilH5eHHr', 'bxUCUcH4KRXHo7uXtx', 'KFKaa4Mpn3', 'AigaR8f4gh'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, uRCQhtlE1kRh0amnF1N.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'q7FbXqlJKy', 'fnQb9cRgwY', 'WpQbLxngjv', 'uWObQZ1gnE', 'dFPbjMXEZm', 'KoFb8GZKtU', 'SPCbp38BM1'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, di82O4q6Uj53JxhWtk.csHigh entropy of concatenated method names: 'KOFjm62Rp3A6IaNaCZT', 'YNbXO52s25pHU1XVr6D', 'tCduTCLqZB', 'HEGuWnTt0x', 'uRFubUtihX', 'kmkSpm2V8K7Z0j4w9Pm', 'iDeFI02hgUA9DVGRfCv'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, bG8EMWkQddhC83cZ0X.csHigh entropy of concatenated method names: 'PILw3wkl6t', 'f4hwCfVkP3', 'TttrATBG7L', 'TaTrelgQQQ', 'JkbrOrKGAZ', 't3DrIXXRGD', 'ES7rJvWhhO', 'WRQryWsV9j', 'jFvrcZogjT', 'dpFrdT2HNv'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, UZvCihlpSA4KvawtT1t.csHigh entropy of concatenated method names: 'yMgWfVXKQc', 'JwdWBBCgVd', 'BvVWF3ckb1', 'AmwWGrZQJh', 'yAYW38VBJi', 'Q55WhJTFQF', 'iY9WC3ocIW', 'b4WWPoDA7M', 'afhWoqTPZi', 'eQvWNrEFmy'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, gFZLHtVi1cnGoMlI5C.csHigh entropy of concatenated method names: 'V8u7XW40nb', 'HVd797NJDB', 't5A7Ll6Cm5', 'HkE7Q5iG08', 'cr57jGg8XH', 'C7t78gTwTf', 'NTG7pPZnJV', 'ERT7000qO2', 'aFL7qSo6rv', 'nSR7x5y77m'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.a690000.12.raw.unpack, EdBOgyLQlxy8sD4Z9O.csHigh entropy of concatenated method names: 'wd4T2ilEop', 'pPdTiPCtyh', 'kk3TAntnOn', 'GWPTeSoKNp', 'VmSTXxn4ST', 'HEpTOh3W5Y', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, SpLaMOR3l4FeepxgUP.csHigh entropy of concatenated method names: 'bEiUP2Axeo', 'sWJUo96Cul', 'SbBU2wGLnV', 'Px7Ui3ZV2c', 'dOrUeO8gD5', 'PwyUOGS75B', 'M5EUJv22Pn', 'MbVUyJ6tRH', 'SltUdIy4RL', 'uwBUlLqMJr'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, VkmGye69RAYTxLxc2O.csHigh entropy of concatenated method names: 'teFsdx1EM4', 'FnMsgUIqNJ', 'b2MsXCXEi0', 'zPws9Vfhkv', 'FJ6siwg2iG', 'Pi8sA9krXQ', 'TTQseaUY7j', 'M2AsO3mcbb', 'VPIsIUMuio', 'WcfsJDRLpT'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, MGZb7lH7pkEf94MkqI.csHigh entropy of concatenated method names: 'UCvk5dtpdw', 'SbLkEiPnVb', 'ToString', 'A0gkty6ieJ', 'yq7k71aFRC', 'sGhkr6Pblx', 'DtokwPBKF9', 'SaKkuhvBN4', 'RGskZ7XN9q', 'FdVkVSo6CS'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, L91crkTO3pohiQSalL.csHigh entropy of concatenated method names: 'snQRK16LYq', 'BIvRt3cUxP', 'zNZR7J5wIJ', 'x8eRrpk8bd', 'YrhRwnACcK', 'EWfRuaUndK', 'FxARZOYJ4s', 'u7VRVcaisG', 'yhwRMgTqmS', 'bA7R5OaMHZ'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, kpYgb9D6Ff7fSuWovH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'QkpmqQGXs9', 'YIvmxnoxVc', 'va5mzCCXtv', 'UaCR6B3BKe', 'ie0Raim06b', 'dIXRmquicH', 'i6aRR9fsOj', 'GKsEYAJ8UU7tT3LIDoN'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, aPihqT8BP7X01FASs8.csHigh entropy of concatenated method names: 'rG5ZfjVhIb', 'H8ZZBOto4S', 'uTmZFIhp5W', 'Xy2ZGebsLc', 'x6aZ309bjZ', 'evIZhV1PsZ', 'cr9ZCf1n6V', 'isxZPykJqG', 'tIGZopRDJh', 'PqwZN4Umkh'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, j1wTVNcYjWdZ0KBQ7U.csHigh entropy of concatenated method names: 'BCru1IpkjF', 'w5nuflNGDg', 'RW0uF5sKK6', 'zy8uG8vvAk', 'QrJuhhwdKU', 'dobuCxq21v', 'mBvuoj5LQi', 'Xj0uNdd2m0', 'VKZuy32CLqVGjDW0qKY', 'MaieSU2tbAUYMMiTSE0'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, wTgVfNuCI3uwOPGUST.csHigh entropy of concatenated method names: 'pnXWaSe4Iu', 'ObPWR1UYrd', 'OXSWYmLNdI', 'KkEWtdm9V8', 'JRJW7nQHA1', 'L8VWweWP0d', 'BiVWuCWTeu', 'mPqTpq40mF', 'mtBT0r0mYB', 'M6HTqVNwse'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, gkISpNzrNpOGGickBX.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nq2WULKJ4h', 'Sv4WsE9DVF', 'IG4WSXCYnU', 'nmYWkB9BeQ', 'V79WTStt9p', 'haTWWsdHtM', 'qsyWb5ruRL'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, w9mrUcoAIVkS8af7j1.csHigh entropy of concatenated method names: 'Dispose', 'ENnaqkRbsA', 'RsAmiFjqEu', 'jkDDDOJkvs', 'mxNaxGrqIk', 'RcHazgInEB', 'ProcessDialogKey', 'w76m60bhta', 'utSmaeO7St', 'qBGmm6xyAV'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, PatEWljIDc1m3P6XAa.csHigh entropy of concatenated method names: 'zb7k0vfSLY', 'NKlkxa2oNP', 'PKrT6h7CEu', 'K5VTaG6V7d', 'WZPklgqAUd', 'mBJkgje4kV', 'avLk4LwFJh', 'spkkXQ368n', 'RYxk9GyAEa', 'dg0kLZg63v'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, AvAgEHF7qrr70lpNOx.csHigh entropy of concatenated method names: 'NfGZtfoxRI', 'aZfZrKEaBJ', 'LA6ZuLutY5', 'pLSuxAe9CT', 'msduztIaEY', 'YmgZ6q1gB5', 'o3VZaZRgO1', 'p5pZm8DQun', 'eu2ZR1urOy', 'Nw4ZY26nBU'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, UajKYRILGVIbZJEpcb.csHigh entropy of concatenated method names: 'g5huKPCs5P', 'PIlu7dB7Dt', 'qjNuwb4O5u', 't6UuZAGnt8', 'H7ZuVNSfHC', 'Rp2wjace4a', 'GxTw8KxBte', 'pbdwpf0Gnm', 'Cksw0AKUF6', 'MjmwqcsE70'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, JfvSQw9dPmHZN4rpEr.csHigh entropy of concatenated method names: 'r9oFhXbn8', 'zVOGfZXDe', 'CuihkQN59', 'MZwCEWLLO', 'CFcobm0ix', 'oeYNvi18q', 'FEAWw1B04kjIymRxfk', 'atCqBinlfA46epT0uX', 'wCGTMrlkf', 'Jq3b4gWgp'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, q7S4syNbpmpA69hF6g.csHigh entropy of concatenated method names: 'ToString', 'N2FSlwRNH3', 'SuDSi2gGuB', 'WwASAEZ5f7', 'GlESekt0fZ', 'uc1SOQla3Y', 'wQMSIh9ged', 'oQTSJiQnLy', 'xdvSymR0ap', 'asyScdWgYW'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, f14LtGhlsArLGlCSZq.csHigh entropy of concatenated method names: 'CxPTt5IRhw', 'b6RT7kLaA5', 'obiTrAqCK5', 'C6pTwbhmZ2', 'G3STuIUSe4', 'DvPTZFD5Hv', 'cBLTVegGhB', 'fZyTMX1rdd', 'NsUT5XgPGx', 'nAGTES9vfV'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, QQ0ZQOfY6Ee2hmJYbs.csHigh entropy of concatenated method names: 'Ay0rG0j2Fs', 'bb0rhifsPc', 'SFkrPwLYa2', 'ocGrokRjvs', 'd5GrsC6JLK', 'N8VrSFvxym', 'GjArk3d0po', 'OXFrTANyDC', 'jv5rWaIR4q', 'OffrbUo70B'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, RE2ydl5EZwof1RDpK8.csHigh entropy of concatenated method names: 'N8RaZjYw6k', 'weUaVNdqa4', 'MJTa5C7JrG', 'WqWaEEUvs1', 'DQJasgOfbA', 'lbiaSjBmT9', 'MQaSfMrUtkilH5eHHr', 'bxUCUcH4KRXHo7uXtx', 'KFKaa4Mpn3', 'AigaR8f4gh'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, uRCQhtlE1kRh0amnF1N.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'q7FbXqlJKy', 'fnQb9cRgwY', 'WpQbLxngjv', 'uWObQZ1gnE', 'dFPbjMXEZm', 'KoFb8GZKtU', 'SPCbp38BM1'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, di82O4q6Uj53JxhWtk.csHigh entropy of concatenated method names: 'KOFjm62Rp3A6IaNaCZT', 'YNbXO52s25pHU1XVr6D', 'tCduTCLqZB', 'HEGuWnTt0x', 'uRFubUtihX', 'kmkSpm2V8K7Z0j4w9Pm', 'iDeFI02hgUA9DVGRfCv'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, bG8EMWkQddhC83cZ0X.csHigh entropy of concatenated method names: 'PILw3wkl6t', 'f4hwCfVkP3', 'TttrATBG7L', 'TaTrelgQQQ', 'JkbrOrKGAZ', 't3DrIXXRGD', 'ES7rJvWhhO', 'WRQryWsV9j', 'jFvrcZogjT', 'dpFrdT2HNv'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, UZvCihlpSA4KvawtT1t.csHigh entropy of concatenated method names: 'yMgWfVXKQc', 'JwdWBBCgVd', 'BvVWF3ckb1', 'AmwWGrZQJh', 'yAYW38VBJi', 'Q55WhJTFQF', 'iY9WC3ocIW', 'b4WWPoDA7M', 'afhWoqTPZi', 'eQvWNrEFmy'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, gFZLHtVi1cnGoMlI5C.csHigh entropy of concatenated method names: 'V8u7XW40nb', 'HVd797NJDB', 't5A7Ll6Cm5', 'HkE7Q5iG08', 'cr57jGg8XH', 'C7t78gTwTf', 'NTG7pPZnJV', 'ERT7000qO2', 'aFL7qSo6rv', 'nSR7x5y77m'
                    Source: 0.2.Dhl Express Shipping Docs .pdf.exe.52bc318.3.raw.unpack, EdBOgyLQlxy8sD4Z9O.csHigh entropy of concatenated method names: 'wd4T2ilEop', 'pPdTiPCtyh', 'kk3TAntnOn', 'GWPTeSoKNp', 'VmSTXxn4ST', 'HEpTOh3W5Y', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile created: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: Possible double extension: pdf.exeStatic PE information: Dhl Express Shipping Docs .pdf.exe
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Dhl Express Shipping Docs .pdf.exe PID: 7060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: emaGqYHYeYNHas.exe PID: 7404, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 8120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 76F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: 9120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: A120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: A710000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: B710000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: C710000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 2D10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 7420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 7170000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 8420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 9420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: 9B80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: AB80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: BB80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4417Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5952Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1423Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1820Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 498
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4604
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe TID: 2888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2844Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7244Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7412Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7356Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe TID: 7476Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99780Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99407Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99282Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99171Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99060Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99655
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99324
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99092
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98984
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98875
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98758
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98516
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98406
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98297
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98187
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98078
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97968
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97859
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97641
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97531
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97422
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97311
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                    Source: RegSvcs.exe, 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: RegSvcs.exe, 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                    Source: emaGqYHYeYNHas.exe, 0000000C.00000002.1445320898.0000000000FF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\h
                    Source: RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_011170B0 CheckRemoteDebuggerPresent,11_2_011170B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9CA008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 6CA008Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeQueries volume information: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.1431070123.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.0000000002932000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl Express Shipping Docs .pdf.exe PID: 7060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl Express Shipping Docs .pdf.exe PID: 7060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.89d9478.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Dhl Express Shipping Docs .pdf.exe.899de58.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.1431070123.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.0000000002932000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl Express Shipping Docs .pdf.exe PID: 7060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    File and Directory Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    311
                    Process Injection
                    13
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    PowerShell
                    Logon Script (Windows)1
                    Scheduled Task/Job
                    12
                    Software Packing
                    Security Account Manager621
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                    Masquerading
                    LSA Secrets251
                    Virtualization/Sandbox Evasion
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts251
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
                    Process Injection
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430785 Sample: Dhl Express Shipping Docs .... Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 50 us2.smtp.mailhostbox.com 2->50 52 ip-api.com 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus / Scanner detection for submitted sample 2->58 60 17 other signatures 2->60 8 Dhl Express Shipping Docs .pdf.exe 7 2->8         started        12 emaGqYHYeYNHas.exe 5 2->12         started        signatures3 process4 file5 42 C:\Users\user\AppData\...\emaGqYHYeYNHas.exe, PE32 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmpB967.tmp, XML 8->44 dropped 62 Suspicious powershell command line found 8->62 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->64 66 Writes to foreign memory regions 8->66 74 3 other signatures 8->74 14 RegSvcs.exe 8->14         started        17 RegSvcs.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        30 3 other processes 8->30 68 Antivirus detection for dropped file 12->68 70 Multi AV Scanner detection for dropped file 12->70 72 Machine Learning detection for dropped file 12->72 22 RegSvcs.exe 12->22         started        24 schtasks.exe 12->24         started        26 RegSvcs.exe 12->26         started        28 RegSvcs.exe 12->28         started        signatures6 process7 dnsIp8 76 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->76 78 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->78 80 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 14->80 46 ip-api.com 208.95.112.1, 49708, 49712, 80 TUT-ASUS United States 17->46 48 us2.smtp.mailhostbox.com 208.91.199.223, 49709, 49713, 587 PUBLIC-DOMAIN-REGISTRYUS United States 17->48 82 Loading BitLocker PowerShell Module 20->82 32 conhost.exe 20->32         started        34 WmiPrvSE.exe 20->34         started        84 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->84 86 Tries to steal Mail credentials (via file / registry access) 22->86 88 Tries to harvest and steal ftp login credentials 22->88 90 Tries to harvest and steal browser information (history, passwords, etc) 22->90 36 conhost.exe 24->36         started        38 conhost.exe 30->38         started        40 conhost.exe 30->40         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Dhl Express Shipping Docs .pdf.exe41%VirustotalBrowse
                    Dhl Express Shipping Docs .pdf.exe37%ReversingLabsWin32.Trojan.Generic
                    Dhl Express Shipping Docs .pdf.exe100%AviraHEUR/AGEN.1309858
                    Dhl Express Shipping Docs .pdf.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe100%AviraHEUR/AGEN.1309858
                    C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe37%ReversingLabsWin32.Trojan.Generic
                    C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe41%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.199.223
                    truefalse
                      high
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ocsp.sectigo.com0ARegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://sectigo.com/CPS0RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1436074423.0000000005D98000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.0000000002916000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BC0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2616814978.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://account.dyn.com/Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://us2.smtp.mailhostbox.comRegSvcs.exe, 0000000B.00000002.1431070123.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDhl Express Shipping Docs .pdf.exe, 00000000.00000002.1404824641.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Dhl Express Shipping Docs .pdf.exe, 00000000.00000002.1404824641.0000000003612000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1431070123.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, emaGqYHYeYNHas.exe, 0000000C.00000002.1446811774.0000000002FA2000.00000004.00000800.00020000.00000000.sdmp, emaGqYHYeYNHas.exe, 0000000C.00000002.1446811774.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ip-api.comRegSvcs.exe, 0000000B.00000002.1431070123.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2609746295.00000000028B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  208.91.199.223
                                  us2.smtp.mailhostbox.comUnited States
                                  394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1430785
                                  Start date and time:2024-04-24 07:15:00 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 18s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:25
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Dhl Express Shipping Docs .pdf.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@27/15@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 96%
                                  • Number of executed functions: 173
                                  • Number of non-executed functions: 9
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  07:15:50API Interceptor1x Sleep call for process: Dhl Express Shipping Docs .pdf.exe modified
                                  07:15:52Task SchedulerRun new task: emaGqYHYeYNHas path: C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                                  07:15:52API Interceptor30x Sleep call for process: powershell.exe modified
                                  07:15:54API Interceptor43x Sleep call for process: RegSvcs.exe modified
                                  07:15:55API Interceptor1x Sleep call for process: emaGqYHYeYNHas.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.1r)_78768.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • ip-api.com/line/?fields=hosting
                                  transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • ip-api.com/line/?fields=hosting
                                  orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • ip-api.com/line/?fields=hosting
                                  RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                                  • ip-api.com/json/
                                  explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  X1.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  208.91.199.223PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                      HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                        TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                          rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                              HmGUCvTQIacWu7Q.exeGet hashmaliciousAgentTeslaBrowse
                                                Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                  Gcerti Quote.exeGet hashmaliciousAgentTeslaBrowse
                                                    Syknivkloo.exeGet hashmaliciousAgentTeslaBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      us2.smtp.mailhostbox.comPR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.223
                                                      OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.198.143
                                                      HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.225
                                                      TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.198.143
                                                      rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 208.91.198.143
                                                      1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      HmGUCvTQIacWu7Q.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.223
                                                      Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                      • 208.91.198.143
                                                      ip-api.comr)_78768.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                                                      • 208.95.112.1
                                                      explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                      • 208.95.112.1
                                                      X1.exeGet hashmaliciousXWormBrowse
                                                      • 208.95.112.1
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TUT-ASUSr)_78768.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 208.95.112.1
                                                      RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                                                      • 208.95.112.1
                                                      explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                      • 208.95.112.1
                                                      X1.exeGet hashmaliciousXWormBrowse
                                                      • 208.95.112.1
                                                      PUBLIC-DOMAIN-REGISTRYUSBARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                      • 207.174.215.249
                                                      PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.223
                                                      BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                      • 207.174.215.249
                                                      OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      PO82100088.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 199.79.62.115
                                                      BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                      • 162.215.248.214
                                                      Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      72625413524.vbsGet hashmaliciousXWormBrowse
                                                      • 116.206.104.215
                                                      HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.91.199.224
                                                      SecuriteInfo.com.MSIL.Kryptik.AGUH.tr.13955.20631.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 162.215.248.214
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.34331486778365
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                      Malicious:false
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                      Process:C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.34331486778365
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                      Malicious:false
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2232
                                                      Entropy (8bit):5.380805901110357
                                                      Encrypted:false
                                                      SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:lGLHyIFKL3IZ2KRH9Oug8s
                                                      MD5:16AD599332DD2FF94DA0787D71688B62
                                                      SHA1:02F738694B02E84FFE3BAB7DE5709001823C6E40
                                                      SHA-256:452876FE504FC0DBEDBD7F8467E94F6E80002DB4572D02C723ABC69F8DF0B367
                                                      SHA-512:A96158FDFFA424A4AC01220EDC789F3236C03AAA6A7C1A3D8BE62074B4923957E6CFEEB6E8852F9064093E0A290B0E56E4B5504D18113A7983F48D5388CEC747
                                                      Malicious:false
                                                      Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe
                                                      File Type:XML 1.0 document, ASCII text
                                                      Category:dropped
                                                      Size (bytes):1587
                                                      Entropy (8bit):5.11953542517831
                                                      Encrypted:false
                                                      SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNti3xvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTev
                                                      MD5:DCC0D3FCE34B147234429ED2E62FFFB4
                                                      SHA1:7F6E5F43A1410593760E77DDF48B95AC67D279CA
                                                      SHA-256:25E002735C1B8831532B4C5858083503B92E5A4EC69435F7D8BC6F4007ACBE8A
                                                      SHA-512:370A56DC7D0D64F63700B55F25722AA16C578768FC42C1A71541006E755B28D35EC06EDC9A5D667F2E00DEC2905FD0E5B01D3419A2FFC9A5B499BB83E39FCE72
                                                      Malicious:true
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                      Process:C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                                                      File Type:XML 1.0 document, ASCII text
                                                      Category:dropped
                                                      Size (bytes):1587
                                                      Entropy (8bit):5.11953542517831
                                                      Encrypted:false
                                                      SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNti3xvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTev
                                                      MD5:DCC0D3FCE34B147234429ED2E62FFFB4
                                                      SHA1:7F6E5F43A1410593760E77DDF48B95AC67D279CA
                                                      SHA-256:25E002735C1B8831532B4C5858083503B92E5A4EC69435F7D8BC6F4007ACBE8A
                                                      SHA-512:370A56DC7D0D64F63700B55F25722AA16C578768FC42C1A71541006E755B28D35EC06EDC9A5D667F2E00DEC2905FD0E5B01D3419A2FFC9A5B499BB83E39FCE72
                                                      Malicious:false
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                      Process:C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):855552
                                                      Entropy (8bit):7.102961572511479
                                                      Encrypted:false
                                                      SSDEEP:12288:+iEx72xrdlMXGnWnpLCzRdoJ6K5/w6ovt51qZ0o1LFMdDP+FIk7N:sSrdrWn4z26UNol510LFMdDP8Ik
                                                      MD5:E7D52516CA8BCF4E8BCAF71A36A88300
                                                      SHA1:D5A7EAAD95AB6D4E492B128DB0CF550C34170C90
                                                      SHA-256:8DF5ECBC8EA978C98C9C3A0918FE9EE233F169EE9E3D38855B7DA8FC96AAD8DC
                                                      SHA-512:0DC86396301012E035ED03086436411B5ABDBE7C2DC84B03D5385739250BF1EFA1BC6FAB96471EB277B62D7A3B1EA663565809493A26750951C6316B131C0751
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 37%
                                                      • Antivirus: Virustotal, Detection: 41%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Y(f............................."... ........@.. ....................................@..................................!..W....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................."......H...........(,......D....................................................0..A....... .........%.....(......... N........%.*...(.....+...(....*.....&*...B...}......}....*...".(.....*...6(....*.....&*...0..........r...p ...... .t.....(....t....*..0..........~......~+.....+V..E....&.......................^...........w.......=...u.......F...%............&...+....>T..... ..... ....Y..+. @... )...(+.....t......u.... .... ....(...+.u.... .... ....(...+,.....8D.....+..*...S .5...(B..
                                                      Process:C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:false
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.102961572511479
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:Dhl Express Shipping Docs .pdf.exe
                                                      File size:855'552 bytes
                                                      MD5:e7d52516ca8bcf4e8bcaf71a36a88300
                                                      SHA1:d5a7eaad95ab6d4e492b128db0cf550c34170c90
                                                      SHA256:8df5ecbc8ea978c98c9c3a0918fe9ee233f169ee9e3d38855b7da8fc96aad8dc
                                                      SHA512:0dc86396301012e035ed03086436411b5abdbe7c2dc84b03d5385739250bf1efa1bc6fab96471eb277b62d7a3b1ea663565809493a26750951c6316b131c0751
                                                      SSDEEP:12288:+iEx72xrdlMXGnWnpLCzRdoJ6K5/w6ovt51qZ0o1LFMdDP+FIk7N:sSrdrWn4z26UNol510LFMdDP8Ik
                                                      TLSH:8105B03D1CBE22BB81B8C2A9CFD58827F540E46B7111AD7594D747A56346E8B38C323E
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Y(f............................."... ........@.. ....................................@................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x4d222e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x662859D1 [Wed Apr 24 01:01:05 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd21d40x57.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x600.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xd02340xd04006dbb807a9179c49d9586debfe1ec569aFalse0.7582052352190877data7.109679695826465IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xd40000x6000x60003125000af64011bb248673c1dff61ccFalse0.421875data4.101906794046182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xd60000xc0x200c529ae714c8744762b626ee9ed1a3e6bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0xd40900x334data0.42073170731707316
                                                      RT_MANIFEST0xd43d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 24, 2024 07:15:54.009422064 CEST4970880192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:54.169136047 CEST8049708208.95.112.1192.168.2.8
                                                      Apr 24, 2024 07:15:54.169290066 CEST4970880192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:54.170142889 CEST4970880192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:54.330070972 CEST8049708208.95.112.1192.168.2.8
                                                      Apr 24, 2024 07:15:54.376646042 CEST4970880192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:55.510374069 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:55.691765070 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:55.691885948 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:56.281218052 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.283309937 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:56.464409113 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.464538097 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.465101004 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:56.646502972 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.653686047 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:56.835109949 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.835139990 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.835151911 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.835181952 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:56.835206985 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:56.835242033 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:57.016264915 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:57.056394100 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:57.238287926 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:57.350255013 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:57.532001019 CEST58749709208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:57.736254930 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:57.937726021 CEST4971280192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:58.097378969 CEST8049712208.95.112.1192.168.2.8
                                                      Apr 24, 2024 07:15:58.097505093 CEST4971280192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:58.098483086 CEST4971280192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:58.258677006 CEST8049712208.95.112.1192.168.2.8
                                                      Apr 24, 2024 07:15:58.327974081 CEST4971280192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:58.635691881 CEST49709587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:58.636164904 CEST4970880192.168.2.8208.95.112.1
                                                      Apr 24, 2024 07:15:59.016530037 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.197962999 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.198040962 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.384898901 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.385119915 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.566483974 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.566503048 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.566713095 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.748529911 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.752310991 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.934272051 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.934309006 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.934324026 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.934339046 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:15:59.934381008 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:15:59.934432983 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:00.116247892 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:00.117798090 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:00.300029039 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:00.314012051 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:00.495778084 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:00.496829033 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:00.680989027 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:00.681346893 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:00.869206905 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:00.869585991 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.053373098 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.054095030 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.258399963 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.258599043 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.441355944 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.441941977 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.442035913 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.442059040 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.442078114 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:01.623611927 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.623667002 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.756494045 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:16:01.798496962 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:16:42.806747913 CEST8049712208.95.112.1192.168.2.8
                                                      Apr 24, 2024 07:17:39.033879042 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:17:39.217370987 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:17:39.218302011 CEST58749713208.91.199.223192.168.2.8
                                                      Apr 24, 2024 07:17:39.218379021 CEST49713587192.168.2.8208.91.199.223
                                                      Apr 24, 2024 07:17:39.222618103 CEST49713587192.168.2.8208.91.199.223
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 24, 2024 07:15:53.827146053 CEST5186853192.168.2.81.1.1.1
                                                      Apr 24, 2024 07:15:53.981570959 CEST53518681.1.1.1192.168.2.8
                                                      Apr 24, 2024 07:15:55.351315022 CEST5558753192.168.2.81.1.1.1
                                                      Apr 24, 2024 07:15:55.509624004 CEST53555871.1.1.1192.168.2.8
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Apr 24, 2024 07:15:53.827146053 CEST192.168.2.81.1.1.10x46d5Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                      Apr 24, 2024 07:15:55.351315022 CEST192.168.2.81.1.1.10xbc45Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Apr 24, 2024 07:15:53.981570959 CEST1.1.1.1192.168.2.80x46d5No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                      Apr 24, 2024 07:15:55.509624004 CEST1.1.1.1192.168.2.80xbc45No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                      Apr 24, 2024 07:15:55.509624004 CEST1.1.1.1192.168.2.80xbc45No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                      Apr 24, 2024 07:15:55.509624004 CEST1.1.1.1192.168.2.80xbc45No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                      Apr 24, 2024 07:15:55.509624004 CEST1.1.1.1192.168.2.80xbc45No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                      • ip-api.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.849708208.95.112.1807308C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Apr 24, 2024 07:15:54.170142889 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                      Host: ip-api.com
                                                      Connection: Keep-Alive
                                                      Apr 24, 2024 07:15:54.330070972 CEST175INHTTP/1.1 200 OK
                                                      Date: Wed, 24 Apr 2024 05:15:53 GMT
                                                      Content-Type: text/plain; charset=utf-8
                                                      Content-Length: 6
                                                      Access-Control-Allow-Origin: *
                                                      X-Ttl: 60
                                                      X-Rl: 44
                                                      Data Raw: 66 61 6c 73 65 0a
                                                      Data Ascii: false


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.849712208.95.112.1807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Apr 24, 2024 07:15:58.098483086 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                      Host: ip-api.com
                                                      Connection: Keep-Alive
                                                      Apr 24, 2024 07:15:58.258677006 CEST175INHTTP/1.1 200 OK
                                                      Date: Wed, 24 Apr 2024 05:15:57 GMT
                                                      Content-Type: text/plain; charset=utf-8
                                                      Content-Length: 6
                                                      Access-Control-Allow-Origin: *
                                                      X-Ttl: 56
                                                      X-Rl: 43
                                                      Data Raw: 66 61 6c 73 65 0a
                                                      Data Ascii: false


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Apr 24, 2024 07:15:56.281218052 CEST58749709208.91.199.223192.168.2.8220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                      Apr 24, 2024 07:15:56.283309937 CEST49709587192.168.2.8208.91.199.223EHLO 124406
                                                      Apr 24, 2024 07:15:56.464538097 CEST58749709208.91.199.223192.168.2.8250-us2.outbound.mailhostbox.com
                                                      250-PIPELINING
                                                      250-SIZE 41648128
                                                      250-VRFY
                                                      250-ETRN
                                                      250-STARTTLS
                                                      250-AUTH PLAIN LOGIN
                                                      250-AUTH=PLAIN LOGIN
                                                      250-ENHANCEDSTATUSCODES
                                                      250-8BITMIME
                                                      250-DSN
                                                      250 CHUNKING
                                                      Apr 24, 2024 07:15:56.465101004 CEST49709587192.168.2.8208.91.199.223STARTTLS
                                                      Apr 24, 2024 07:15:56.646502972 CEST58749709208.91.199.223192.168.2.8220 2.0.0 Ready to start TLS
                                                      Apr 24, 2024 07:15:59.384898901 CEST58749713208.91.199.223192.168.2.8220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                      Apr 24, 2024 07:15:59.385119915 CEST49713587192.168.2.8208.91.199.223EHLO 124406
                                                      Apr 24, 2024 07:15:59.566503048 CEST58749713208.91.199.223192.168.2.8250-us2.outbound.mailhostbox.com
                                                      250-PIPELINING
                                                      250-SIZE 41648128
                                                      250-VRFY
                                                      250-ETRN
                                                      250-STARTTLS
                                                      250-AUTH PLAIN LOGIN
                                                      250-AUTH=PLAIN LOGIN
                                                      250-ENHANCEDSTATUSCODES
                                                      250-8BITMIME
                                                      250-DSN
                                                      250 CHUNKING
                                                      Apr 24, 2024 07:15:59.566713095 CEST49713587192.168.2.8208.91.199.223STARTTLS
                                                      Apr 24, 2024 07:15:59.748529911 CEST58749713208.91.199.223192.168.2.8220 2.0.0 Ready to start TLS

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:07:15:50
                                                      Start date:24/04/2024
                                                      Path:C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                                                      Imagebase:0xf60000
                                                      File size:855'552 bytes
                                                      MD5 hash:E7D52516CA8BCF4E8BCAF71A36A88300
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1411956229.0000000008921000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl Express Shipping Docs .pdf.exe"
                                                      Imagebase:0xd20000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6ee680000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe"
                                                      Imagebase:0xd20000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6ee680000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpB967.tmp"
                                                      Imagebase:0x210000
                                                      File size:187'904 bytes
                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:07:15:51
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6ee680000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:07:15:52
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x2e0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:07:15:52
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x260000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:07:15:52
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x7c0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1431070123.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1431070123.0000000002B53000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1425518560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:07:15:52
                                                      Start date:24/04/2024
                                                      Path:C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\emaGqYHYeYNHas.exe
                                                      Imagebase:0x8f0000
                                                      File size:855'552 bytes
                                                      MD5 hash:E7D52516CA8BCF4E8BCAF71A36A88300
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 37%, ReversingLabs
                                                      • Detection: 41%, Virustotal, Browse
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:07:15:54
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                      Imagebase:0x7ff605670000
                                                      File size:496'640 bytes
                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:14
                                                      Start time:07:15:56
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\user\AppData\Local\Temp\tmpCA21.tmp"
                                                      Imagebase:0x210000
                                                      File size:187'904 bytes
                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:15
                                                      Start time:07:15:56
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6ee680000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:16
                                                      Start time:07:15:56
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x420000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:17
                                                      Start time:07:15:56
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x2a0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:18
                                                      Start time:07:15:56
                                                      Start date:24/04/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0x5d0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.2609746295.0000000002932000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.2609746295.000000000290E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.2609746295.00000000028E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:9%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:143
                                                        Total number of Limit Nodes:11
                                                        execution_graph 27959 7a32e40 27960 7a32fcb 27959->27960 27961 7a32e66 27959->27961 27961->27960 27964 7a330c0 PostMessageW 27961->27964 27966 7a330b9 27961->27966 27965 7a3312c 27964->27965 27965->27961 27967 7a330c0 PostMessageW 27966->27967 27968 7a3312c 27967->27968 27968->27961 27944 326d460 27945 326d4a6 27944->27945 27949 326d630 27945->27949 27953 326d640 27945->27953 27946 326d593 27950 326d640 27949->27950 27956 326d238 27950->27956 27954 326d238 DuplicateHandle 27953->27954 27955 326d66e 27954->27955 27955->27946 27957 326d6a8 DuplicateHandle 27956->27957 27958 326d66e 27957->27958 27958->27946 27969 32647c0 27970 32647c9 27969->27970 27971 32647cf 27970->27971 27973 32648b9 27970->27973 27974 32648dd 27973->27974 27978 3264dc0 27974->27978 27982 3264dd0 27974->27982 27979 3264df7 27978->27979 27980 3264ed4 27979->27980 27986 326450c 27979->27986 27980->27980 27984 3264df7 27982->27984 27983 3264ed4 27983->27983 27984->27983 27985 326450c CreateActCtxA 27984->27985 27985->27983 27987 3265e60 CreateActCtxA 27986->27987 27989 3265f23 27987->27989 27990 7a31b48 27991 7a31b5d 27990->27991 27995 7a31b82 27991->27995 28000 7a31b88 27991->28000 27992 7a31b6f 27996 7a31ba2 27995->27996 28005 7a31ee2 27996->28005 28021 7a31ef0 27996->28021 27997 7a31bc6 27997->27992 28001 7a31ba2 28000->28001 28003 7a31ee2 6 API calls 28001->28003 28004 7a31ef0 6 API calls 28001->28004 28002 7a31bc6 28002->27992 28003->28002 28004->28002 28006 7a31f05 28005->28006 28017 7a31f17 28006->28017 28037 7a32223 28006->28037 28041 7a3257f 28006->28041 28044 7a32a7f 28006->28044 28048 7a32636 28006->28048 28052 7a3200f 28006->28052 28056 7a32088 28006->28056 28061 7a3256b 28006->28061 28064 7a327eb 28006->28064 28067 7a3228b 28006->28067 28070 7a32125 28006->28070 28073 7a329a7 28006->28073 28076 7a32761 28006->28076 28079 7a32862 28006->28079 28017->27997 28022 7a31f05 28021->28022 28023 7a32223 WriteProcessMemory 28022->28023 28024 7a32862 WriteProcessMemory 28022->28024 28025 7a32761 ResumeThread 28022->28025 28026 7a329a7 Wow64SetThreadContext 28022->28026 28027 7a32125 ReadProcessMemory 28022->28027 28028 7a3228b VirtualAllocEx 28022->28028 28029 7a327eb ResumeThread 28022->28029 28030 7a3256b ResumeThread 28022->28030 28031 7a32088 CreateProcessA 28022->28031 28032 7a3200f CreateProcessA 28022->28032 28033 7a31f17 28022->28033 28034 7a32636 WriteProcessMemory 28022->28034 28035 7a32a7f ResumeThread 28022->28035 28036 7a3257f Wow64SetThreadContext 28022->28036 28023->28033 28024->28033 28025->28033 28026->28033 28027->28033 28028->28033 28029->28033 28030->28033 28031->28033 28032->28033 28033->27997 28034->28033 28035->28033 28036->28033 28038 7a32246 28037->28038 28082 78be7b8 28038->28082 28086 78be1e8 28041->28086 28046 7a32778 28044->28046 28045 7a32a93 28046->28045 28090 78bdd00 28046->28090 28049 7a3263c 28048->28049 28051 78be7b8 WriteProcessMemory 28049->28051 28050 7a32950 28051->28050 28053 7a32018 28052->28053 28094 78bea40 28053->28094 28058 7a32018 28056->28058 28057 7a32b68 28057->28017 28058->28057 28060 78bea40 CreateProcessA 28058->28060 28059 7a320d9 28059->28017 28060->28059 28062 7a32578 28061->28062 28063 78bdd00 ResumeThread 28062->28063 28063->28062 28065 7a32779 28064->28065 28065->28064 28066 78bdd00 ResumeThread 28065->28066 28066->28065 28098 78be6f8 28067->28098 28102 78be8a8 28070->28102 28075 78be1e8 Wow64SetThreadContext 28073->28075 28074 7a32104 28074->28017 28075->28074 28077 7a32767 28076->28077 28078 78bdd00 ResumeThread 28077->28078 28078->28077 28081 78be7b8 WriteProcessMemory 28079->28081 28080 7a32886 28081->28080 28083 78be800 WriteProcessMemory 28082->28083 28085 78be857 28083->28085 28085->28017 28087 78be22d Wow64SetThreadContext 28086->28087 28089 78be275 28087->28089 28091 78bdd40 ResumeThread 28090->28091 28093 78bdd71 28091->28093 28093->28046 28095 78beac9 28094->28095 28095->28095 28096 78bec2e CreateProcessA 28095->28096 28097 78bec8b 28096->28097 28099 78be738 VirtualAllocEx 28098->28099 28101 78be775 28099->28101 28101->28017 28103 78be8f3 ReadProcessMemory 28102->28103 28105 78be937 28103->28105 28105->28017 28106 326b0d8 28107 326b0e7 28106->28107 28110 326b1c0 28106->28110 28118 326b1d0 28106->28118 28111 326b1e1 28110->28111 28112 326b204 28110->28112 28111->28112 28126 326b468 28111->28126 28130 326b459 28111->28130 28112->28107 28113 326b1fc 28113->28112 28114 326b408 GetModuleHandleW 28113->28114 28115 326b435 28114->28115 28115->28107 28119 326b1e1 28118->28119 28120 326b204 28118->28120 28119->28120 28124 326b468 LoadLibraryExW 28119->28124 28125 326b459 LoadLibraryExW 28119->28125 28120->28107 28121 326b1fc 28121->28120 28122 326b408 GetModuleHandleW 28121->28122 28123 326b435 28122->28123 28123->28107 28124->28121 28125->28121 28127 326b47c 28126->28127 28128 326b4a1 28127->28128 28134 326aee8 28127->28134 28128->28113 28131 326b47c 28130->28131 28132 326b4a1 28131->28132 28133 326aee8 LoadLibraryExW 28131->28133 28132->28113 28133->28132 28135 326b648 LoadLibraryExW 28134->28135 28137 326b6c1 28135->28137 28137->28128
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1411530623.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7a30000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a94d0a36bb9f8f56ff226239a5185b898eb5d62026ef40d5120794b1c7a8de8f
                                                        • Instruction ID: c872a6f2463f3a144b9d2e05dc54d61ccf60b313178c7dc536a46e6f5f2b5296
                                                        • Opcode Fuzzy Hash: a94d0a36bb9f8f56ff226239a5185b898eb5d62026ef40d5120794b1c7a8de8f
                                                        • Instruction Fuzzy Hash: 34D06CB4868309CBC714DF69D844ABABBB8BB0B304F112096E42AF7251DA309884CE05
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 78bea40-78bead5 2 78beb0e-78beb2e 0->2 3 78bead7-78beae1 0->3 8 78beb30-78beb3a 2->8 9 78beb67-78beb96 2->9 3->2 4 78beae3-78beae5 3->4 5 78beb08-78beb0b 4->5 6 78beae7-78beaf1 4->6 5->2 10 78beaf3 6->10 11 78beaf5-78beb04 6->11 8->9 12 78beb3c-78beb3e 8->12 19 78beb98-78beba2 9->19 20 78bebcf-78bec89 CreateProcessA 9->20 10->11 11->11 13 78beb06 11->13 14 78beb61-78beb64 12->14 15 78beb40-78beb4a 12->15 13->5 14->9 17 78beb4e-78beb5d 15->17 18 78beb4c 15->18 17->17 21 78beb5f 17->21 18->17 19->20 22 78beba4-78beba6 19->22 31 78bec8b-78bec91 20->31 32 78bec92-78bed18 20->32 21->14 24 78bebc9-78bebcc 22->24 25 78beba8-78bebb2 22->25 24->20 26 78bebb6-78bebc5 25->26 27 78bebb4 25->27 26->26 29 78bebc7 26->29 27->26 29->24 31->32 42 78bed1a-78bed1e 32->42 43 78bed28-78bed2c 32->43 42->43 44 78bed20 42->44 45 78bed2e-78bed32 43->45 46 78bed3c-78bed40 43->46 44->43 45->46 47 78bed34 45->47 48 78bed42-78bed46 46->48 49 78bed50-78bed54 46->49 47->46 48->49 50 78bed48 48->50 51 78bed66-78bed6d 49->51 52 78bed56-78bed5c 49->52 50->49 53 78bed6f-78bed7e 51->53 54 78bed84 51->54 52->51 53->54
                                                        APIs
                                                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 078BEC76
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 075de39e27140edf4b2afa361c55c5fdc783ca81311d5732dc2bb80d4a7311af
                                                        • Instruction ID: d5da881e105663468da36e15a2b407a3b2312a72a53a77ec48c3a26e3082cc1b
                                                        • Opcode Fuzzy Hash: 075de39e27140edf4b2afa361c55c5fdc783ca81311d5732dc2bb80d4a7311af
                                                        • Instruction Fuzzy Hash: 3E9139B1D0021ADFEB24CF68C8457EEBBB2BF44310F1485A9D849E7290DB759985CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 56 326b1d0-326b1df 57 326b1e1-326b1ee call 326ae84 56->57 58 326b20b-326b20f 56->58 65 326b204 57->65 66 326b1f0 57->66 59 326b223-326b264 58->59 60 326b211-326b21b 58->60 67 326b266-326b26e 59->67 68 326b271-326b27f 59->68 60->59 65->58 111 326b1f6 call 326b468 66->111 112 326b1f6 call 326b459 66->112 67->68 70 326b2a3-326b2a5 68->70 71 326b281-326b286 68->71 69 326b1fc-326b1fe 69->65 72 326b340-326b400 69->72 73 326b2a8-326b2af 70->73 74 326b291 71->74 75 326b288-326b28f call 326ae90 71->75 106 326b402-326b405 72->106 107 326b408-326b433 GetModuleHandleW 72->107 76 326b2b1-326b2b9 73->76 77 326b2bc-326b2c3 73->77 78 326b293-326b2a1 74->78 75->78 76->77 82 326b2c5-326b2cd 77->82 83 326b2d0-326b2d9 call 326aea0 77->83 78->73 82->83 87 326b2e6-326b2eb 83->87 88 326b2db-326b2e3 83->88 90 326b2ed-326b2f4 87->90 91 326b309-326b316 87->91 88->87 90->91 92 326b2f6-326b306 call 326aeb0 call 326aec0 90->92 96 326b318-326b336 91->96 97 326b339-326b33f 91->97 92->91 96->97 106->107 108 326b435-326b43b 107->108 109 326b43c-326b450 107->109 108->109 111->69 112->69
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0326B426
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: c87f0054278cab6c934a5e251920aab5c038a6882afb161d7b94f7402acc39a7
                                                        • Instruction ID: bbfb7a8dfd1c28653d0662545a2de8e0a4dc045becd8baadc0b541031255b71c
                                                        • Opcode Fuzzy Hash: c87f0054278cab6c934a5e251920aab5c038a6882afb161d7b94f7402acc39a7
                                                        • Instruction Fuzzy Hash: 0E7157B0A10B058FDB24DF6AD15075ABBF5FF88200F148A2DD49ADBA50DB74E885CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 113 326450c-3265f21 CreateActCtxA 116 3265f23-3265f29 113->116 117 3265f2a-3265f84 113->117 116->117 124 3265f86-3265f89 117->124 125 3265f93-3265f97 117->125 124->125 126 3265fa8 125->126 127 3265f99-3265fa5 125->127 129 3265fa9 126->129 127->126 129->129
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 03265F11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 79038d76d3b28178ae319e0d5c1790cba470605d0a72afb8895bdd2230ff52d2
                                                        • Instruction ID: f1cfc2d30a9fc42b8a2b899ee40f55e8dbe44e96d751e66a3f91b233c1ab6a24
                                                        • Opcode Fuzzy Hash: 79038d76d3b28178ae319e0d5c1790cba470605d0a72afb8895bdd2230ff52d2
                                                        • Instruction Fuzzy Hash: 8C41CFB0C1071DCBDB24CFA9C844B9EBBF5BF49304F24846AD808AB251DBB56985CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 130 3265e55-3265f21 CreateActCtxA 132 3265f23-3265f29 130->132 133 3265f2a-3265f84 130->133 132->133 140 3265f86-3265f89 133->140 141 3265f93-3265f97 133->141 140->141 142 3265fa8 141->142 143 3265f99-3265fa5 141->143 145 3265fa9 142->145 143->142 145->145
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 03265F11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: fef395f92d91c505c547af224a06d625ab964f366f3dff2eb40bd791e9d4f908
                                                        • Instruction ID: a957c04857b75b32cddc5313cdb35e8ee59f6ac646db7fe2a6b039cc2b869088
                                                        • Opcode Fuzzy Hash: fef395f92d91c505c547af224a06d625ab964f366f3dff2eb40bd791e9d4f908
                                                        • Instruction Fuzzy Hash: 7641CDB0C10719CFDB24CFA9C84479EBBB5BF4A304F24856AD408AB291DBB56986CF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 146 78be7b8-78be806 148 78be808-78be814 146->148 149 78be816-78be855 WriteProcessMemory 146->149 148->149 151 78be85e-78be88e 149->151 152 78be857-78be85d 149->152 152->151
                                                        APIs
                                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 078BE848
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: d7f7bd0ed109e4751e7524fe38aa0fa79ef8e4d4bdca1a6f9015c2d32e6a7d96
                                                        • Instruction ID: 98afa99e1c71d53bc5a59e44bb715a1851df290f83554355272592b16caec011
                                                        • Opcode Fuzzy Hash: d7f7bd0ed109e4751e7524fe38aa0fa79ef8e4d4bdca1a6f9015c2d32e6a7d96
                                                        • Instruction Fuzzy Hash: B92127B19003499FDB10CFAAC881BDEBBF5FF48310F14842AE918A7340D7799945DBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 156 326d238-326d73c DuplicateHandle 158 326d745-326d762 156->158 159 326d73e-326d744 156->159 159->158
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0326D66E,?,?,?,?,?), ref: 0326D72F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: e1a52e53b867a9152736d7f09f82c03fe3d330936686256f5a6f161b650f17cf
                                                        • Instruction ID: d89b64ad2183e1e654e39ce94a74a8f3800d385f5120c9723ae507858555b6cd
                                                        • Opcode Fuzzy Hash: e1a52e53b867a9152736d7f09f82c03fe3d330936686256f5a6f161b650f17cf
                                                        • Instruction Fuzzy Hash: 8221E5B590024C9FDB11CFAAD884AEEFBF4EF48310F14841AE914A3350D374A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 162 326d6a1-326d6a3 163 326d6a8-326d73c DuplicateHandle 162->163 164 326d745-326d762 163->164 165 326d73e-326d744 163->165 165->164
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0326D66E,?,?,?,?,?), ref: 0326D72F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 70e7eb9d706d98dc41c964c6bbe4bd2c8809d13484b524b9a606726dde24c351
                                                        • Instruction ID: c1bda796950917ff7ff96e991ab24bbd83dd6469de4222ea637175948656ab61
                                                        • Opcode Fuzzy Hash: 70e7eb9d706d98dc41c964c6bbe4bd2c8809d13484b524b9a606726dde24c351
                                                        • Instruction Fuzzy Hash: ED21B3B5D00249AFDB11CFAAD884ADEFBF8EB48310F14841AE914A3350D375A945CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 168 78be1e8-78be233 170 78be243-78be273 Wow64SetThreadContext 168->170 171 78be235-78be241 168->171 173 78be27c-78be2ac 170->173 174 78be275-78be27b 170->174 171->170 174->173
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 078BE266
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 7023fc99ecf844e049638f43af7f3ca982931835f30b0eeb0d4c2a7b08bf2dad
                                                        • Instruction ID: aa1878d0ab0be9a0120446b75ad2f42457c3333edf811db263bd210f6d59483a
                                                        • Opcode Fuzzy Hash: 7023fc99ecf844e049638f43af7f3ca982931835f30b0eeb0d4c2a7b08bf2dad
                                                        • Instruction Fuzzy Hash: B42115B1D003098FDB14DFAAC8857EEBBF4AF48214F14842AE519A7340CB78A945CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 178 78be8a8-78be935 ReadProcessMemory 181 78be93e-78be96e 178->181 182 78be937-78be93d 178->182 182->181
                                                        APIs
                                                        • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 078BE928
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: fb83172bfea0f4b9e149c0698a4681927778029b744c27f2e0067aa013ae2089
                                                        • Instruction ID: 031247b307beffcb30186dbe545e054f9cb4ada4dbaf5822fe45aca666a4b6af
                                                        • Opcode Fuzzy Hash: fb83172bfea0f4b9e149c0698a4681927778029b744c27f2e0067aa013ae2089
                                                        • Instruction Fuzzy Hash: 7F2139B19003499FDB10CFAAC880BEEFBF5FF48310F14842AE518A7250C7799905DBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 186 326aee8-326b688 188 326b690-326b6bf LoadLibraryExW 186->188 189 326b68a-326b68d 186->189 190 326b6c1-326b6c7 188->190 191 326b6c8-326b6e5 188->191 189->188 190->191
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0326B4A1,00000800,00000000,00000000), ref: 0326B6B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 3e90a63ae7ce60c32aa3acbe0e6a12206e835a9ad8f063b0ab97a2ae8290059b
                                                        • Instruction ID: 20e88d0ce123f045c397ab8b60089ce66b753972afc98538d1cf69c70e68ba5d
                                                        • Opcode Fuzzy Hash: 3e90a63ae7ce60c32aa3acbe0e6a12206e835a9ad8f063b0ab97a2ae8290059b
                                                        • Instruction Fuzzy Hash: FF1126B69003498FDB14CFAAC444BDEFBF4EF48710F14842AE919A7250C3B5A985CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 194 326b641-326b688 196 326b690-326b6bf LoadLibraryExW 194->196 197 326b68a-326b68d 194->197 198 326b6c1-326b6c7 196->198 199 326b6c8-326b6e5 196->199 197->196 198->199
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0326B4A1,00000800,00000000,00000000), ref: 0326B6B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 273a5fc44e3998f8de3aa73f6bc045f92208a7a51e731612a1090dff98f49880
                                                        • Instruction ID: 123931ccfeb4e7685f15d08894b2c501d6f3a8007fb287f039426c4859411bc0
                                                        • Opcode Fuzzy Hash: 273a5fc44e3998f8de3aa73f6bc045f92208a7a51e731612a1090dff98f49880
                                                        • Instruction Fuzzy Hash: 241144B29002098FDB10CFAAC844BDEFBF4AF58310F14841AD418A7210C374A545CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 202 78be6f8-78be773 VirtualAllocEx 205 78be77c-78be7a1 202->205 206 78be775-78be77b 202->206 206->205
                                                        APIs
                                                        • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 078BE766
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: c23804168a29e70fe26466c8428e1a851230876d1bfcf041d2d7d98d1009290d
                                                        • Instruction ID: 486772c9e72c4a3d90a2960822384f786c0bb5e1369040e2eed8ea2865ee4dd0
                                                        • Opcode Fuzzy Hash: c23804168a29e70fe26466c8428e1a851230876d1bfcf041d2d7d98d1009290d
                                                        • Instruction Fuzzy Hash: 3A1126729003499FDB20DFAAC844BDFBFF5AF48310F14881AE519A7250C779A940CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 210 78bdd00-78bdd6f ResumeThread 213 78bdd78-78bdd9d 210->213 214 78bdd71-78bdd77 210->214 214->213
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 4cc4da7320c35f0847c30ae52ee9c1dd7c566196b0e0eef4cf32fceadae32b7e
                                                        • Instruction ID: b2da1f2ddd161a7f1cbd3633ed198ba34f36e1ab6d7d3bcf549c0de1b10a8037
                                                        • Opcode Fuzzy Hash: 4cc4da7320c35f0847c30ae52ee9c1dd7c566196b0e0eef4cf32fceadae32b7e
                                                        • Instruction Fuzzy Hash: 0E113AB19003498FDB24DFAAC8457EFFBF4AF88714F14881AD519A7240C779A944CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 218 326b3c0-326b400 219 326b402-326b405 218->219 220 326b408-326b433 GetModuleHandleW 218->220 219->220 221 326b435-326b43b 220->221 222 326b43c-326b450 220->222 221->222
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0326B426
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 87d95b779b8c3424bfbd51a086374147f3585b4a78f0e30c98dfc13f9d2cf172
                                                        • Instruction ID: d9cdc0fbc9987d122adc623aa9f68fcfd86f036c90e43ce3f6eb9db0f44a99c5
                                                        • Opcode Fuzzy Hash: 87d95b779b8c3424bfbd51a086374147f3585b4a78f0e30c98dfc13f9d2cf172
                                                        • Instruction Fuzzy Hash: 6C11E0B5D007498FDB14CF9AD844BDEFBF4AF88314F14841AD829A7650C379A585CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 224 7a330b9-7a3312a PostMessageW 226 7a33133-7a33147 224->226 227 7a3312c-7a33132 224->227 227->226
                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 07A3311D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1411530623.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7a30000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 8ae849260030ece4258147fe9ad198413df25cdabb2db604ccdd164b7a0a7008
                                                        • Instruction ID: 1b5ac4e94dc9dca37b8bb05a2760e8984d0c626e1fdd652be792d2c9355af7f4
                                                        • Opcode Fuzzy Hash: 8ae849260030ece4258147fe9ad198413df25cdabb2db604ccdd164b7a0a7008
                                                        • Instruction Fuzzy Hash: 1D1122B5800349DFDB10DF9AD885BDEFBF8EB48320F10880AE518A7600D375A940CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 07A3311D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1411530623.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7a30000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: a9fbccdaf8c046b83aa58ca858953a20e5f617b745c41eb4b47bf59a5d295bd3
                                                        • Instruction ID: e6b131ef9cf69c3c132f59ad9e6268c70fd66bb0ef4468bd3c60bbce4a234b1f
                                                        • Opcode Fuzzy Hash: a9fbccdaf8c046b83aa58ca858953a20e5f617b745c41eb4b47bf59a5d295bd3
                                                        • Instruction Fuzzy Hash: 2C1115B58003499FDB10CF9AC885BDEFFF8EB48320F14841AE518A3240C375A944CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404200925.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_192d000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4de06a983e0aec32e8b2a3d3a296faa5b0ce2daf7a7787e1513d7a7764c66f2f
                                                        • Instruction ID: 57359793b9844e1e84d2c73aec4d68a5b55c38ca8a534a0e16db1681c60498ff
                                                        • Opcode Fuzzy Hash: 4de06a983e0aec32e8b2a3d3a296faa5b0ce2daf7a7787e1513d7a7764c66f2f
                                                        • Instruction Fuzzy Hash: 9F2100B2504240EFEB05DF94D9C0F26BFE5FB88718F20C569E8090B25EC376D456CAA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404277187.000000000193D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0193D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_193d000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0896ee6414cba41c23bdfe8330abc02fd9f8ce118ceda710fefcf772a1d4817c
                                                        • Instruction ID: 2b14cd66e19bf50c7584efe9d3639503795dc7e02ec715c06b181856f2959f9d
                                                        • Opcode Fuzzy Hash: 0896ee6414cba41c23bdfe8330abc02fd9f8ce118ceda710fefcf772a1d4817c
                                                        • Instruction Fuzzy Hash: 4F2100B1604200EFDB15DFA4D8D0B26FBE5FBC4A14F60C969E84E0B242C336D447CA62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404277187.000000000193D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0193D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_193d000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f97f382a064407578f82dc66f45eed424f38b44ea9c41e5cb8a461add090be03
                                                        • Instruction ID: 1682512cc794c6c242bf83fb7d7130afb52c190fd5d9f938687ce325817d8c75
                                                        • Opcode Fuzzy Hash: f97f382a064407578f82dc66f45eed424f38b44ea9c41e5cb8a461add090be03
                                                        • Instruction Fuzzy Hash: 1E2183755093808FC703CF64D594715BFB1EB46214F28C5EAD8498F6A7C33A980ACB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404200925.000000000192D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0192D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_192d000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                        • Instruction ID: d90169cea4b29a6b7a97b35be07acfdf74650b7e6f8bfec06a2a70a3e6a5fbd8
                                                        • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                        • Instruction Fuzzy Hash: 9611D376504280CFDB16CF54D5C4B16BFB1FB84318F24C6A9D8494B65BC336D45ACBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: T+-q$[V~*$]\`
                                                        • API String ID: 0-3978741314
                                                        • Opcode ID: 1cae56b74e575d75424f7e168f07a77567ffe78094a51eb4fa0667f9a45bbb89
                                                        • Instruction ID: b1cbc033e2bfd06305ccb368af94e298e6995505bed3d5590dd1c8e068102154
                                                        • Opcode Fuzzy Hash: 1cae56b74e575d75424f7e168f07a77567ffe78094a51eb4fa0667f9a45bbb89
                                                        • Instruction Fuzzy Hash: EAB1F7B4E15219DBCB04CFAAD9809DEFBB2BF9A300F14D52AD415EB358D330A9068F54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: T=}
                                                        • API String ID: 0-79086117
                                                        • Opcode ID: de5c55312b72d1dc5e12f97ba87cf72303a9b72ae50bd6cd0fd2aa4f22983ad9
                                                        • Instruction ID: 7a0c7f3f8be1c03b42614d4c9af1aca3ad6ebcde96525b2303802d281deb4639
                                                        • Opcode Fuzzy Hash: de5c55312b72d1dc5e12f97ba87cf72303a9b72ae50bd6cd0fd2aa4f22983ad9
                                                        • Instruction Fuzzy Hash: 97E10AB4E002199FDB14DFA9C580AAEFBB2FF89305F248169D418AB355D730AD41CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1a58d4526a9d33ecb6c881455c064cce252a71f54d1ef73c9596e657ff835497
                                                        • Instruction ID: 379821668c7f516dcb8bfe8edbddd15f06cf43d9c8947d9a207d47bceec295e2
                                                        • Opcode Fuzzy Hash: 1a58d4526a9d33ecb6c881455c064cce252a71f54d1ef73c9596e657ff835497
                                                        • Instruction Fuzzy Hash: 66E1F7B4E102198FDB24DFA9C580AAEFBB2FF89305F2481A9D414AB355D730AD41CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5f03717dec4e0abbbc6864b243df8bd5aab6c7fc43f79eeb7e68f9123f5ff1f7
                                                        • Instruction ID: 0e833c0fe4b4e83d8db49f0577fea4cebd802ba603eec8079584af02633f74e6
                                                        • Opcode Fuzzy Hash: 5f03717dec4e0abbbc6864b243df8bd5aab6c7fc43f79eeb7e68f9123f5ff1f7
                                                        • Instruction Fuzzy Hash: 72E108B4E102198FDB24DFA9C580AAEFBB2FF89305F2481A9D414AB355D730AD41CF64
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f83ffc19b460fefd138703140dfaa30e8d1fb9b928f5bfb9ad428317edd34e6f
                                                        • Instruction ID: 7bc3cadbcaa37440baa4e636aac8fcb19a3cec2931728a5df5a1a3854eb45037
                                                        • Opcode Fuzzy Hash: f83ffc19b460fefd138703140dfaa30e8d1fb9b928f5bfb9ad428317edd34e6f
                                                        • Instruction Fuzzy Hash: 7CE109B4E102198FDB24DFA9C580AAEFBB2FF89305F2481A9D414AB355D731AD41CF64
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9c72209bb050562f02d40e45f33d413d48571c4c8adbdbf985c289b210471d30
                                                        • Instruction ID: c27209b6b2bff1c2b453f4314e10d292a26ccd8d6c1ebb44c1ea1fa06a180277
                                                        • Opcode Fuzzy Hash: 9c72209bb050562f02d40e45f33d413d48571c4c8adbdbf985c289b210471d30
                                                        • Instruction Fuzzy Hash: FAE1F9B4E102198FDB24DFA9C580AAEFBB2FF89305F248169D414AB355D734AD41CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ac4748d54ce7acaeda7c6dce4e933f300d144cee9fb9bfc0853aee252729c3a
                                                        • Instruction ID: 4c9decc66d6dc81ca065748430513036da2905f3e1180b03973367c33697bb97
                                                        • Opcode Fuzzy Hash: 3ac4748d54ce7acaeda7c6dce4e933f300d144cee9fb9bfc0853aee252729c3a
                                                        • Instruction Fuzzy Hash: C1D1063182075A8ACB11EBB4D9906A9F7B1FFD9300F11DB9AD44A37250EF746AC4CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1410937262.00000000078B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78b0000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b3774937292c2ae3de53cebdb34441ffc33eec902cd0966741ace30ae750d967
                                                        • Instruction ID: d36b523d3d96e44e18bf6084dddcdd1c6661186d206115735b4cce45addaeabc
                                                        • Opcode Fuzzy Hash: b3774937292c2ae3de53cebdb34441ffc33eec902cd0966741ace30ae750d967
                                                        • Instruction Fuzzy Hash: 46D1E63182075A8ACB11EBB4D9906A9F7B1FFD9300F10DB9AD54A37250EF746AC4CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1404687861.0000000003260000.00000040.00000800.00020000.00000000.sdmp, Offset: 03260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3260000_Dhl Express Shipping Docs .jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8c0bb129065b839994c9125a37beef4e4779d3cb074ce83b48baddc9c1d3a68
                                                        • Instruction ID: ccd3da1e035615dda233beb9d5fc40693d862983b9f126c06d33d105d111d3bd
                                                        • Opcode Fuzzy Hash: d8c0bb129065b839994c9125a37beef4e4779d3cb074ce83b48baddc9c1d3a68
                                                        • Instruction Fuzzy Hash: B1A18C36A20706DFCF05DFB4D98059EBBB2FF84300B15416AE805AB261DB71E996CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:12.8%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:12.5%
                                                        Total number of Nodes:24
                                                        Total number of Limit Nodes:4
                                                        execution_graph 24980 11170b0 24981 11170f4 CheckRemoteDebuggerPresent 24980->24981 24982 1117136 24981->24982 24983 1110848 24984 111084e 24983->24984 24985 111091b 24984->24985 24987 111137f 24984->24987 24987->24987 24990 1111383 24987->24990 24988 11114a6 24988->24984 24990->24988 24991 1118278 24990->24991 24992 1118282 24991->24992 24993 111829c 24992->24993 24996 63ef63a 24992->24996 25002 63ef648 24992->25002 24993->24990 24998 63ef65d 24996->24998 24997 63ef872 24997->24993 24998->24997 24999 63efee3 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 24998->24999 25000 63efca0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 24998->25000 25001 63efc90 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 24998->25001 24999->24998 25000->24998 25001->24998 25004 63ef65d 25002->25004 25003 63ef872 25003->24993 25004->25003 25005 63efee3 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25004->25005 25006 63efca0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25004->25006 25007 63efc90 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25004->25007 25005->25004 25006->25004 25007->25004

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 621 63e51b0-63e51cd 622 63e51cf-63e51d2 621->622 623 63e51ee-63e51f1 622->623 624 63e51d4-63e51e9 622->624 625 63e51ff-63e5202 623->625 626 63e51f3-63e51fa 623->626 624->623 628 63e520c-63e520f 625->628 629 63e5204-63e5207 625->629 626->625 630 63e522c-63e522f 628->630 631 63e5211-63e5227 628->631 629->628 632 63e5245-63e5248 630->632 633 63e5231-63e5240 630->633 631->630 635 63e524f-63e5252 632->635 636 63e524a-63e524c 632->636 633->632 638 63e5276-63e5279 635->638 639 63e5254-63e5271 635->639 636->635 640 63e527b-63e5281 638->640 641 63e5288-63e528b 638->641 639->638 642 63e528d-63e5297 640->642 643 63e5283 640->643 641->642 644 63e52a5-63e52a8 641->644 648 63e529e-63e52a0 642->648 643->641 646 63e52aa-63e52b0 644->646 647 63e52bb-63e52be 644->647 649 63e52b6 646->649 650 63e5350-63e5353 646->650 651 63e52cd-63e52d0 647->651 652 63e52c0-63e52c6 647->652 648->644 649->647 654 63e5358-63e535a 650->654 657 63e52e4-63e52e7 651->657 658 63e52d2-63e52df 651->658 655 63e52fe-63e5304 652->655 656 63e52c8 652->656 659 63e535c 654->659 660 63e5361-63e5364 654->660 662 63e5378-63e53a3 655->662 663 63e5306-63e530e 655->663 656->651 657->652 661 63e52e9-63e52ec 657->661 658->657 659->660 660->622 666 63e536a-63e5377 660->666 664 63e52ee-63e52f2 661->664 665 63e52f9-63e52fc 661->665 674 63e53ad-63e53b0 662->674 663->662 667 63e5310-63e531d 663->667 664->666 669 63e52f4 664->669 665->655 670 63e5328-63e532b 665->670 667->662 672 63e531f-63e5323 667->672 669->665 670->640 673 63e5331-63e5334 670->673 672->670 675 63e533c-63e533f 673->675 676 63e5336-63e5337 673->676 677 63e53c8-63e53cb 674->677 678 63e53b2-63e53c3 674->678 679 63e534b-63e534e 675->679 680 63e5341-63e534a 675->680 676->675 681 63e53dc-63e53df 677->681 682 63e53cd-63e53d7 677->682 678->677 679->650 679->654 683 63e5401-63e5404 681->683 684 63e53e1-63e53e5 681->684 682->681 688 63e5426-63e5429 683->688 689 63e5406-63e540a 683->689 686 63e549a-63e54d4 684->686 687 63e53eb-63e53f3 684->687 711 63e54d6-63e54d9 686->711 687->686 691 63e53f9-63e53fc 687->691 693 63e542b-63e5432 688->693 694 63e5433-63e5436 688->694 689->686 692 63e5410-63e5418 689->692 691->683 692->686 695 63e541e-63e5421 692->695 696 63e5438-63e543c 694->696 697 63e5450-63e5453 694->697 695->688 696->686 699 63e543e-63e5446 696->699 700 63e5455-63e545c 697->700 701 63e5463-63e5466 697->701 699->686 706 63e5448-63e544b 699->706 702 63e545e 700->702 703 63e5492-63e5499 700->703 704 63e5468-63e546c 701->704 705 63e5480-63e5482 701->705 702->701 704->686 708 63e546e-63e5476 704->708 709 63e5489-63e548c 705->709 710 63e5484 705->710 706->697 708->686 712 63e5478-63e547b 708->712 709->674 709->703 710->709 713 63e54db-63e54ec 711->713 714 63e54f3-63e54f6 711->714 712->705 720 63e551e-63e5525 713->720 721 63e54ee 713->721 715 63e54f8-63e5509 714->715 716 63e5514-63e5517 714->716 724 63e550f 715->724 725 63e5863-63e5876 715->725 718 63e5519-63e551c 716->718 719 63e5572-63e5706 716->719 718->720 723 63e552a-63e552d 718->723 771 63e583f-63e5852 719->771 772 63e570c-63e5713 719->772 720->723 721->714 727 63e552f-63e5534 723->727 728 63e5537-63e553a 723->728 724->716 727->728 729 63e553c-63e5543 728->729 730 63e5548-63e554b 728->730 729->730 731 63e554d-63e555e 730->731 732 63e5569-63e556c 730->732 731->713 739 63e5564 731->739 732->719 735 63e5855-63e5858 732->735 735->719 737 63e585e-63e5861 735->737 737->725 740 63e5879-63e587c 737->740 739->732 741 63e587e-63e588f 740->741 742 63e589a-63e589d 740->742 741->720 751 63e5895 741->751 744 63e589f-63e58b0 742->744 745 63e58bb-63e58bd 742->745 744->720 754 63e58b6 744->754 746 63e58bf 745->746 747 63e58c4-63e58c7 745->747 746->747 747->711 750 63e58cd-63e58d6 747->750 751->742 754->745 773 63e5719-63e573c 772->773 774 63e57c7-63e57ce 772->774 783 63e5744-63e574c 773->783 774->771 776 63e57d0-63e5803 774->776 787 63e5808-63e5835 776->787 788 63e5805 776->788 785 63e574e 783->785 786 63e5751-63e5792 783->786 785->786 796 63e57aa-63e57bb 786->796 797 63e5794-63e57a5 786->797 787->750 787->771 788->787 796->750 797->750
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-3993045852
                                                        • Opcode ID: c600ab3abc3be60b81d8ac6b383f272d63cb6c9a35b67c68e69342b5bbc140f4
                                                        • Instruction ID: a1122493bcda2579161ebf1259b5ef0fd4601f260a1d0ee635a3c5dfeac78377
                                                        • Opcode Fuzzy Hash: c600ab3abc3be60b81d8ac6b383f272d63cb6c9a35b67c68e69342b5bbc140f4
                                                        • Instruction Fuzzy Hash: 59229031F002258FDF64DBA4C5806AEB7B2FB85324F24856AD415AB394DB76DC46CBE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 832 11170b0-1117134 CheckRemoteDebuggerPresent 834 1117136-111713c 832->834 835 111713d-1117178 832->835 834->835
                                                        APIs
                                                        • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 01117127
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1430783720.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_1110000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CheckDebuggerPresentRemote
                                                        • String ID:
                                                        • API String ID: 3662101638-0
                                                        • Opcode ID: 253d0c49f3a3fba57c0e1c3044da46660b3e496c3c64a238bae5662589a285eb
                                                        • Instruction ID: bf253723db6a60431d3e919e3b27f8f70009879d7bc40ea5af4a47bff3f0eaa8
                                                        • Opcode Fuzzy Hash: 253d0c49f3a3fba57c0e1c3044da46660b3e496c3c64a238bae5662589a285eb
                                                        • Instruction Fuzzy Hash: 392139B1801259CFDB14CF9AD884BEEFBF5AF49210F14842AE459A3350D778A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e39e3b511082044f5d3061f7ea8ef7e101d6d96f19bd754f968e6dac044c7110
                                                        • Instruction ID: 3b2a5b32e86e867476becaa8455446e420fae20971210dad1dc291f0b463d2da
                                                        • Opcode Fuzzy Hash: e39e3b511082044f5d3061f7ea8ef7e101d6d96f19bd754f968e6dac044c7110
                                                        • Instruction Fuzzy Hash: 11D26C30E00219CFDB64DB64C584A9EB7F2FF85314F5485AAD409AB3A1EB35ED85CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2503dbcc0d956b2ee9eaeadea7908c3f370e7ce2ce69619c7b91ae4e12470ccf
                                                        • Instruction ID: a7dde9e2a5f6b5d905916beab9ddf333c21d8aedfd3d95d00139a1649eba7291
                                                        • Opcode Fuzzy Hash: 2503dbcc0d956b2ee9eaeadea7908c3f370e7ce2ce69619c7b91ae4e12470ccf
                                                        • Instruction Fuzzy Hash: 94628B34A00225DFDF64DB68D985AADB7F2EF85314F148429E406EB391DB35EC46CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39dbdc7b6fc07bf15608d169821ac638b3124b0164583f2835ae0e17339771f5
                                                        • Instruction ID: 5fcf3381450c462091d124ac0cf83b61a94a9763deeab89eafb496a5538b4d6f
                                                        • Opcode Fuzzy Hash: 39dbdc7b6fc07bf15608d169821ac638b3124b0164583f2835ae0e17339771f5
                                                        • Instruction Fuzzy Hash: 80528E30E102198FEF65DB68DA807ADF7B2EB85710F608526E406EB391DB35DC45CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2326 63ec1a8-63ec1c8 2327 63ec1ca-63ec1cd 2326->2327 2328 63ec1cf-63ec1f4 2327->2328 2329 63ec1f9-63ec1fc 2327->2329 2328->2329 2330 63ec1fe-63ec203 2329->2330 2331 63ec206-63ec209 2329->2331 2330->2331 2332 63ec20b-63ec21a 2331->2332 2333 63ec221-63ec224 2331->2333 2340 63ec22f-63ec232 2332->2340 2343 63ec21c 2332->2343 2335 63ec22a-63ec22d 2333->2335 2336 63ec2f3-63ec2fc 2333->2336 2335->2340 2341 63ec237-63ec23a 2335->2341 2338 63ec49f-63ec4a8 2336->2338 2339 63ec302 2336->2339 2344 63ec4ae-63ec4b5 2338->2344 2345 63ec53b-63ec575 2338->2345 2346 63ec307-63ec30a 2339->2346 2340->2341 2347 63ec24c-63ec24f 2341->2347 2348 63ec23c-63ec247 2341->2348 2343->2333 2349 63ec4ba-63ec4bd 2344->2349 2371 63ec577-63ec57a 2345->2371 2350 63ec30c-63ec328 2346->2350 2351 63ec32d-63ec330 2346->2351 2352 63ec27b-63ec27e 2347->2352 2353 63ec251-63ec276 2347->2353 2348->2347 2359 63ec4bf-63ec4e5 2349->2359 2360 63ec4ea-63ec4ed 2349->2360 2350->2351 2355 63ec332-63ec335 2351->2355 2356 63ec340-63ec343 2351->2356 2357 63ec2ab-63ec2ae 2352->2357 2358 63ec280-63ec2a6 2352->2358 2353->2352 2363 63ec33b 2355->2363 2364 63ec2b0-63ec2b3 2355->2364 2368 63ec345-63ec34b 2356->2368 2369 63ec350-63ec353 2356->2369 2357->2364 2372 63ec2c5-63ec2c8 2357->2372 2358->2357 2359->2360 2366 63ec50e-63ec511 2360->2366 2367 63ec4ef-63ec509 2360->2367 2363->2356 2364->2345 2373 63ec2b9-63ec2c0 2364->2373 2375 63ec51e-63ec520 2366->2375 2376 63ec513-63ec519 2366->2376 2367->2366 2368->2369 2377 63ec367-63ec36a 2369->2377 2378 63ec355-63ec35c 2369->2378 2381 63ec57c-63ec586 2371->2381 2382 63ec587-63ec58a 2371->2382 2372->2355 2374 63ec2ca-63ec2cd 2372->2374 2373->2372 2393 63ec2ee-63ec2f1 2374->2393 2394 63ec2cf-63ec2e9 2374->2394 2387 63ec527-63ec52a 2375->2387 2388 63ec522 2375->2388 2376->2375 2389 63ec36c-63ec36f 2377->2389 2390 63ec374-63ec377 2377->2390 2385 63ec479-63ec47a 2378->2385 2386 63ec362 2378->2386 2391 63ec58c-63ec5a5 2382->2391 2392 63ec5b6-63ec5b9 2382->2392 2400 63ec47f-63ec482 2385->2400 2386->2377 2387->2327 2396 63ec530-63ec53a 2387->2396 2388->2387 2389->2390 2397 63ec398-63ec39b 2390->2397 2398 63ec379-63ec393 2390->2398 2433 63ec62b-63ec637 2391->2433 2435 63ec5ab-63ec5b5 2391->2435 2401 63ec5bb-63ec5c9 2392->2401 2402 63ec5d0-63ec5d3 2392->2402 2393->2336 2393->2346 2394->2393 2405 63ec3bc-63ec3bf 2397->2405 2406 63ec39d-63ec3b7 2397->2406 2398->2397 2407 63ec49a-63ec49d 2400->2407 2408 63ec484-63ec495 2400->2408 2401->2391 2428 63ec5cb 2401->2428 2411 63ec5d5-63ec5ee 2402->2411 2412 63ec5f3-63ec5f6 2402->2412 2417 63ec421-63ec424 2405->2417 2418 63ec3c1-63ec41c 2405->2418 2406->2405 2407->2338 2407->2349 2408->2407 2411->2412 2413 63ec5f8-63ec614 2412->2413 2414 63ec619-63ec61b 2412->2414 2413->2414 2423 63ec61d 2414->2423 2424 63ec622-63ec625 2414->2424 2421 63ec44e-63ec451 2417->2421 2422 63ec426-63ec449 2417->2422 2418->2417 2431 63ec46a-63ec46d 2421->2431 2432 63ec453-63ec465 2421->2432 2422->2421 2423->2424 2424->2371 2424->2433 2428->2402 2440 63ec46f-63ec471 2431->2440 2441 63ec474-63ec477 2431->2441 2432->2431 2438 63ec63d-63ec646 2433->2438 2439 63ec7d7-63ec7e1 2433->2439 2444 63ec64c-63ec66c 2438->2444 2445 63ec7e2-63ec816 2438->2445 2440->2441 2441->2385 2441->2400 2459 63ec7c5-63ec7d1 2444->2459 2460 63ec672-63ec67b 2444->2460 2451 63ec818-63ec81b 2445->2451 2453 63ec83e-63ec841 2451->2453 2454 63ec81d-63ec839 2451->2454 2457 63ec9fb-63ec9fd 2453->2457 2458 63ec847-63ec855 2453->2458 2454->2453 2462 63ec9ff 2457->2462 2463 63eca04-63eca07 2457->2463 2466 63ec85c-63ec85e 2458->2466 2459->2438 2459->2439 2460->2445 2464 63ec681-63ec6b0 call 63e65a8 2460->2464 2462->2463 2463->2451 2467 63eca0d-63eca16 2463->2467 2481 63ec6f2-63ec708 2464->2481 2482 63ec6b2-63ec6ea 2464->2482 2469 63ec875-63ec89f 2466->2469 2470 63ec860-63ec863 2466->2470 2479 63ec8a5-63ec8ae 2469->2479 2480 63ec9f0-63ec9fa 2469->2480 2470->2467 2483 63ec9c9-63ec9ee 2479->2483 2484 63ec8b4-63ec9c1 call 63e65a8 2479->2484 2488 63ec70a-63ec71e 2481->2488 2489 63ec726-63ec73c 2481->2489 2482->2481 2483->2467 2484->2479 2533 63ec9c7 2484->2533 2488->2489 2496 63ec73e-63ec752 2489->2496 2497 63ec75a-63ec76d 2489->2497 2496->2497 2504 63ec76f-63ec779 2497->2504 2505 63ec77b 2497->2505 2507 63ec780-63ec782 2504->2507 2505->2507 2508 63ec784-63ec789 2507->2508 2509 63ec7b3-63ec7bf 2507->2509 2511 63ec78b-63ec795 2508->2511 2512 63ec797 2508->2512 2509->2459 2509->2460 2513 63ec79c-63ec79e 2511->2513 2512->2513 2513->2509 2515 63ec7a0-63ec7ac 2513->2515 2515->2509 2533->2480
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: adb24cd561552d51ece0609967fec49537f4c96ba252e5ec9068df4099697088
                                                        • Instruction ID: 38c51f094abf859b28f5d448d29dc6facc0ebef84f66b6d6a4399b72a71d450b
                                                        • Opcode Fuzzy Hash: adb24cd561552d51ece0609967fec49537f4c96ba252e5ec9068df4099697088
                                                        • Instruction Fuzzy Hash: 2632AE30B102159FDF64DB68D980BADB7B2FB88314F109525E415EB395DB39EC46CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40c2fb0ede29e8b644fc4c3f7e2970c6de32066d211670adce56c2220218eeec
                                                        • Instruction ID: 61786db58bafd67fc86ede05de4afb825fdd9e432466a4240bc79dd66a2f82e1
                                                        • Opcode Fuzzy Hash: 40c2fb0ede29e8b644fc4c3f7e2970c6de32066d211670adce56c2220218eeec
                                                        • Instruction Fuzzy Hash: CB029A30B00225DFDF54EB68D9946AEB7A2BF84314F248529D415EB391DB36EC46CBE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 800 111eff8-111f003 801 111f005-111f02c 800->801 802 111f02d-111f030 800->802 803 111f031-111f043 802->803 822 111f045 call 111efe9 803->822 823 111f045 call 111f088 803->823 824 111f045 call 111f0c8 803->824 825 111f045 call 111eff8 803->825 806 111f04a-111f04c 807 111f052-111f0a4 806->807 808 111f04e-111f051 806->808 807->803 813 111f0a6-111f0b1 807->813 814 111f0b3-111f0b6 813->814 815 111f0b7-111f144 GlobalMemoryStatusEx 813->815 818 111f146-111f14c 815->818 819 111f14d-111f175 815->819 818->819 822->806 823->806 824->806 825->806
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1430783720.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_1110000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b51525864878c820d336ed168e0452137f51be801549ae8d209aa251bd6df3a2
                                                        • Instruction ID: 44e177123691c384161609f3b41428bec92ab09d570e45726e8a45dce619f21d
                                                        • Opcode Fuzzy Hash: b51525864878c820d336ed168e0452137f51be801549ae8d209aa251bd6df3a2
                                                        • Instruction Fuzzy Hash: BC411672D143998FDB14CFA9D8042DEFBF5AF85220F14856BD404A7281D7789889CBD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 826 11170ae-1117134 CheckRemoteDebuggerPresent 828 1117136-111713c 826->828 829 111713d-1117178 826->829 828->829
                                                        APIs
                                                        • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 01117127
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1430783720.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_1110000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CheckDebuggerPresentRemote
                                                        • String ID:
                                                        • API String ID: 3662101638-0
                                                        • Opcode ID: f7d62462495a5428650b88b7b811674a0eb8ac022b6a609a5f11d15dd179bce9
                                                        • Instruction ID: 8bd60af54a1eeb94e241b76f90f9614ae01e6af48155d6cf160e8e953adbcf0d
                                                        • Opcode Fuzzy Hash: f7d62462495a5428650b88b7b811674a0eb8ac022b6a609a5f11d15dd179bce9
                                                        • Instruction Fuzzy Hash: 922159B1801259CFDB14CFAAD484BEEFBF4EF48210F14842AE459A3350C7789944CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 838 111f0c8-111f144 GlobalMemoryStatusEx 840 111f146-111f14c 838->840 841 111f14d-111f175 838->841 840->841
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0111F137
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1430783720.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_1110000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: 617daf13be24612267751d98d981a0b267291616e772c7b45a1d9c8486db82eb
                                                        • Instruction ID: 7e65f1851e2217da50f1a475a3571332deec3b2087b2e63fb445ff4357f4dd04
                                                        • Opcode Fuzzy Hash: 617daf13be24612267751d98d981a0b267291616e772c7b45a1d9c8486db82eb
                                                        • Instruction Fuzzy Hash: DE1130B2C0025ADBDB14CFAAC5447DEFBF4BF48220F10812AD828B7240D378A905CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1422 63efee3-63efef8 1423 63efefa-63eff1e 1422->1423 1424 63efeb2 1422->1424 1490 63eff21 call 111eb60 1423->1490 1491 63eff21 call 111ea5c 1423->1491 1425 63efeb4-63efeb7 1424->1425 1427 63efebd-63efec7 1425->1427 1428 63efcc1-63efcc4 1425->1428 1426 63eff27-63eff46 1453 63eff4e-63eff78 1426->1453 1429 63efcce-63efcd1 1428->1429 1430 63efcc6-63efcc9 1428->1430 1431 63efcd3-63efce0 1429->1431 1432 63efce1-63efce4 1429->1432 1430->1429 1432->1431 1434 63efce6-63efce9 1432->1434 1435 63efceb-63efcff 1434->1435 1436 63efd02-63efd05 1434->1436 1435->1436 1438 63efd1b-63efd1e 1436->1438 1439 63efd07-63efd0d 1436->1439 1444 63efd3e-63efd41 1438->1444 1445 63efd20-63efd39 1438->1445 1442 63efd0f 1439->1442 1443 63efd16 1439->1443 1442->1443 1448 63efe6f-63efe71 1442->1448 1449 63efe99-63efe9b 1442->1449 1450 63efdb4-63efdba 1442->1450 1443->1438 1446 63efe6a-63efe6d 1444->1446 1447 63efd47-63efd52 1444->1447 1445->1444 1446->1448 1454 63efe94-63efe97 1446->1454 1461 63efd8d-63efda0 1447->1461 1462 63efd54-63efd8b 1447->1462 1459 63efe78-63efe8f 1448->1459 1492 63efe9d call 63efee3 1449->1492 1493 63efe9d call 63eff00 1449->1493 1451 63efdbc-63efdda 1450->1451 1452 63efde2-63efde7 call 111efc0 1450->1452 1451->1452 1466 63efded-63efe54 1452->1466 1476 63eff7a-63eff97 1453->1476 1477 63eff99 1453->1477 1454->1449 1456 63efeab-63efead 1454->1456 1456->1425 1464 63efeaf 1456->1464 1458 63efea3-63efeaa 1459->1454 1468 63efda2-63efda6 1461->1468 1462->1468 1464->1425 1473 63efda8 1468->1473 1474 63efdb1 1468->1474 1473->1474 1474->1450 1480 63effab-63effb2 1476->1480 1477->1480 1490->1426 1491->1426 1492->1458 1493->1458
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: 3c6b5bf08537cbc694c56bcef43368a30c4db72c9eed17cc17a276deff97a435
                                                        • Instruction ID: 0c4c4f7253e36f4fe8e879789dd4477e5d5bf5c147139be6cdee020f7b1ad5b5
                                                        • Opcode Fuzzy Hash: 3c6b5bf08537cbc694c56bcef43368a30c4db72c9eed17cc17a276deff97a435
                                                        • Instruction Fuzzy Hash: 1E21C171F142109FDB50DB789804BAD7BF1AF8D610F1144AAE90ADB3A1DB399C05CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1494 63eff00-63eff1e 1495 63eff27-63eff46 1494->1495 1507 63eff21 call 111eb60 1494->1507 1508 63eff21 call 111ea5c 1494->1508 1499 63eff4e-63eff78 1495->1499 1502 63eff7a-63eff97 1499->1502 1503 63eff99 1499->1503 1504 63effab-63effb2 1502->1504 1503->1504 1507->1495 1508->1495
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: 7bf536a3c4b0a570f010d9355adc51f801ea3cba226fa429062802e7a15405c7
                                                        • Instruction ID: 2f9862f386e3af6985ff366c2a845a810c1bb9fefdde782d045fbba728e6a787
                                                        • Opcode Fuzzy Hash: 7bf536a3c4b0a570f010d9355adc51f801ea3cba226fa429062802e7a15405c7
                                                        • Instruction Fuzzy Hash: 5F114C70B102259FDB54DB789804B6E77F5AF4C650F104469E50AEB390DB799901CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1781 63ecf60-63ecf7b 1782 63ecf7d-63ecf80 1781->1782 1783 63ecf82-63ecf9e 1782->1783 1784 63ecfa3-63ecfa6 1782->1784 1783->1784 1785 63ecfa8-63ecfaa 1784->1785 1786 63ecfb5-63ecfb8 1784->1786 1787 63ed449 1785->1787 1788 63ecfb0 1785->1788 1789 63ecfba-63ecfbc 1786->1789 1790 63ecfc7-63ecfca 1786->1790 1794 63ed44c-63ed458 1787->1794 1788->1786 1792 63ed307-63ed310 1789->1792 1793 63ecfc2 1789->1793 1795 63ecfcc-63ecfdb 1790->1795 1796 63ed013-63ed016 1790->1796 1800 63ed31f-63ed32b 1792->1800 1801 63ed312-63ed317 1792->1801 1793->1790 1794->1795 1802 63ed45e-63ed74b 1794->1802 1803 63ecfdd-63ecfe2 1795->1803 1804 63ecfea-63ecff6 1795->1804 1797 63ed05f-63ed062 1796->1797 1798 63ed018-63ed05a 1796->1798 1807 63ed0ab-63ed0ae 1797->1807 1808 63ed064-63ed0a6 1797->1808 1798->1797 1805 63ed43c-63ed441 1800->1805 1806 63ed331-63ed345 1800->1806 1801->1800 1993 63ed972-63ed97c 1802->1993 1994 63ed751-63ed757 1802->1994 1803->1804 1809 63ecffc-63ed00e 1804->1809 1810 63ed97d-63ed9b6 1804->1810 1805->1787 1806->1787 1826 63ed34b-63ed35d 1806->1826 1812 63ed0f7-63ed0fa 1807->1812 1813 63ed0b0-63ed0f2 1807->1813 1808->1807 1809->1796 1825 63ed9b8-63ed9bb 1810->1825 1816 63ed0fc-63ed13e 1812->1816 1817 63ed143-63ed146 1812->1817 1813->1812 1816->1817 1822 63ed18f-63ed192 1817->1822 1823 63ed148-63ed18a 1817->1823 1833 63ed1db-63ed1de 1822->1833 1834 63ed194-63ed1a3 1822->1834 1823->1822 1831 63ed9bd 1825->1831 1832 63ed9ca-63ed9cd 1825->1832 1849 63ed35f-63ed365 1826->1849 1850 63ed381-63ed383 1826->1850 2040 63ed9bd call 63edae8 1831->2040 2041 63ed9bd call 63edad5 1831->2041 1841 63ed9cf-63ed9eb 1832->1841 1842 63ed9f0-63ed9f3 1832->1842 1836 63ed1e8-63ed1eb 1833->1836 1837 63ed1e0-63ed1e5 1833->1837 1843 63ed1a5-63ed1aa 1834->1843 1844 63ed1b2-63ed1be 1834->1844 1852 63ed1ed-63ed22f 1836->1852 1853 63ed234-63ed237 1836->1853 1837->1836 1841->1842 1847 63eda26-63eda28 1842->1847 1848 63ed9f5-63eda21 1842->1848 1843->1844 1844->1810 1851 63ed1c4-63ed1d6 1844->1851 1860 63eda2f-63eda32 1847->1860 1861 63eda2a 1847->1861 1848->1847 1862 63ed369-63ed375 1849->1862 1863 63ed367 1849->1863 1873 63ed38d-63ed399 1850->1873 1851->1833 1852->1853 1857 63ed239-63ed27b 1853->1857 1858 63ed280-63ed283 1853->1858 1855 63ed9c3-63ed9c5 1855->1832 1857->1858 1869 63ed2cc-63ed2cf 1858->1869 1870 63ed285-63ed2c7 1858->1870 1860->1825 1868 63eda34-63eda43 1860->1868 1861->1860 1871 63ed377-63ed37f 1862->1871 1863->1871 1898 63edaaa-63edabf 1868->1898 1899 63eda45-63edaa8 call 63e65a8 1868->1899 1869->1794 1882 63ed2d5-63ed2d8 1869->1882 1870->1869 1871->1873 1901 63ed39b-63ed3a5 1873->1901 1902 63ed3a7 1873->1902 1890 63ed2da-63ed2f0 1882->1890 1891 63ed2f5-63ed2f7 1882->1891 1890->1891 1893 63ed2fe-63ed301 1891->1893 1894 63ed2f9 1891->1894 1893->1782 1893->1792 1894->1893 1899->1898 1904 63ed3ac-63ed3ae 1901->1904 1902->1904 1904->1787 1913 63ed3b4-63ed3d0 call 63e65a8 1904->1913 1929 63ed3df-63ed3eb 1913->1929 1930 63ed3d2-63ed3d7 1913->1930 1929->1805 1932 63ed3ed-63ed43a 1929->1932 1930->1929 1932->1787 1995 63ed759-63ed75e 1994->1995 1996 63ed766-63ed76f 1994->1996 1995->1996 1996->1810 1997 63ed775-63ed788 1996->1997 1999 63ed78e-63ed794 1997->1999 2000 63ed962-63ed96c 1997->2000 2001 63ed796-63ed79b 1999->2001 2002 63ed7a3-63ed7ac 1999->2002 2000->1993 2000->1994 2001->2002 2002->1810 2003 63ed7b2-63ed7d3 2002->2003 2006 63ed7d5-63ed7da 2003->2006 2007 63ed7e2-63ed7eb 2003->2007 2006->2007 2007->1810 2008 63ed7f1-63ed80e 2007->2008 2008->2000 2011 63ed814-63ed81a 2008->2011 2011->1810 2012 63ed820-63ed839 2011->2012 2014 63ed83f-63ed866 2012->2014 2015 63ed955-63ed95c 2012->2015 2014->1810 2018 63ed86c-63ed876 2014->2018 2015->2000 2015->2011 2018->1810 2019 63ed87c-63ed893 2018->2019 2021 63ed895-63ed8a0 2019->2021 2022 63ed8a2-63ed8bd 2019->2022 2021->2022 2022->2015 2027 63ed8c3-63ed8dc call 63e65a8 2022->2027 2031 63ed8de-63ed8e3 2027->2031 2032 63ed8eb-63ed8f4 2027->2032 2031->2032 2032->1810 2033 63ed8fa-63ed94e 2032->2033 2033->2015 2040->1855 2041->1855
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd954d62ae39309ef46dfd336e1b08cf21299853362553d7015de4517c74da4b
                                                        • Instruction ID: f180011ad36631216e76dcecdbf34c6ffe45d87aaf62e5e4b7ce1368248a247a
                                                        • Opcode Fuzzy Hash: cd954d62ae39309ef46dfd336e1b08cf21299853362553d7015de4517c74da4b
                                                        • Instruction Fuzzy Hash: 34626A30A0020A9FDF65EB68D990A9DB3F2FF84714F208A28D0099F755DB35ED46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef3f2386c723d2ef0fa0063eb3607250744fb7196ff82b993798bcc6f009d34a
                                                        • Instruction ID: 26c2d3c22d2a763a879b6b985db042dcf71113d2117b2fdb213aedfd4114c2cd
                                                        • Opcode Fuzzy Hash: ef3f2386c723d2ef0fa0063eb3607250744fb7196ff82b993798bcc6f009d34a
                                                        • Instruction Fuzzy Hash: 56E1AF30F102198FDF59EBA8D9806AEB7F2FFC5614F108529D406AB394DB359C46CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a01dfde49fc9f08e2b0f03f7fa80169e697fc30023799b124fa8afd060837fab
                                                        • Instruction ID: e36ba28a7e79cd02fbdb146c4c3aead53267688bbbc39aec7fea59fe6750bd1a
                                                        • Opcode Fuzzy Hash: a01dfde49fc9f08e2b0f03f7fa80169e697fc30023799b124fa8afd060837fab
                                                        • Instruction Fuzzy Hash: 86A1A530F002198BEF65DB6CDA907AEF6A2EB89710F604425E406EB3D5CA34DC459BF5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d847dece9beb90e320c4b7de7bb368833e11c8d9fabe260ec0f51ef04ecdacc5
                                                        • Instruction ID: 7ffd1e6426006cfb71468d3f9029376acd4235a5176a9e58878804bd2bb104a2
                                                        • Opcode Fuzzy Hash: d847dece9beb90e320c4b7de7bb368833e11c8d9fabe260ec0f51ef04ecdacc5
                                                        • Instruction Fuzzy Hash: 17917030B0021A9FDF54EB69C9557AE73F6AF84704F108569D80AEB384EF31AD46CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0256da0f9709bc0caf38ee23305f09ddf9575c013eed4ac4069b879c397f7145
                                                        • Instruction ID: b1c616964ec638713a7678885c2427a009832003790884f2b023b9e38b0b4caa
                                                        • Opcode Fuzzy Hash: 0256da0f9709bc0caf38ee23305f09ddf9575c013eed4ac4069b879c397f7145
                                                        • Instruction Fuzzy Hash: 56610471F005214BDF50AA7EC98469EBAE7EFD4620F154439D80ADB360DE76ED0287D1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b06bd4a9755d2f1bafec3d36e0566512ec41d2cf3ed99545f24294d23080e11
                                                        • Instruction ID: f8db4354f4eca62e8f7c98f33a77980542880bd4d4b114e02352f07b7f377a67
                                                        • Opcode Fuzzy Hash: 8b06bd4a9755d2f1bafec3d36e0566512ec41d2cf3ed99545f24294d23080e11
                                                        • Instruction Fuzzy Hash: 94818E30B002199FDF54DBB9C9547AEB7F2AF89304F108529E40ADB395DB39EC468B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ff864cf0fc596cfaec036ffd54fb1a8b9dece90e9bc768500fc040c20bf8ea04
                                                        • Instruction ID: b7fdaac227c6f036468f527f81d0eb47f65424fac26f4d9d5fe63fe219d8ecfb
                                                        • Opcode Fuzzy Hash: ff864cf0fc596cfaec036ffd54fb1a8b9dece90e9bc768500fc040c20bf8ea04
                                                        • Instruction Fuzzy Hash: 7E817D30B002199FDF54DBB9C9547AEB7F2AF89304F108529E40AEB395DB35EC468B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6d505c2c74e1b655dff9e906f431d98a77cbc9cf9f91c2c9edc123804c003a00
                                                        • Instruction ID: bde0855f4f673699f8852f01e2e9f6427cef4147530305bd3ae9b94abe0de163
                                                        • Opcode Fuzzy Hash: 6d505c2c74e1b655dff9e906f431d98a77cbc9cf9f91c2c9edc123804c003a00
                                                        • Instruction Fuzzy Hash: A5914F30E102198BDF60DF68C890BDDB7B1FF89310F208595D549AB295DB71AA85CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75d9d85fe708b1efcc156861452f3afcbbb77e3f89c15e62216555abfa3e610a
                                                        • Instruction ID: 461db02cc07cd33e3d5c9a4023f2eb704040bc3daa328d2856e2638e2531d717
                                                        • Opcode Fuzzy Hash: 75d9d85fe708b1efcc156861452f3afcbbb77e3f89c15e62216555abfa3e610a
                                                        • Instruction Fuzzy Hash: 7E913E30E102198BDF64DF68C890BDDB7B1FF89310F208599D549BB295EB71AA85CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c3e2224e8fff0766422171d0a35f051b9c0cfbe2d1d6e1dc6ce6185d82ba3a4f
                                                        • Instruction ID: 3b982da1a7071c69bea7578111e63090fdddbdbc007823781a19c8722dd505ca
                                                        • Opcode Fuzzy Hash: c3e2224e8fff0766422171d0a35f051b9c0cfbe2d1d6e1dc6ce6185d82ba3a4f
                                                        • Instruction Fuzzy Hash: 51713E34E002199FDB54DBA8D980A9EBBF6FF84314F248529E405EB395DB34ED46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c880182ed6a44c636270805dcb1727134673603d52a4b7cbc7d445ce9927d35c
                                                        • Instruction ID: 783451fe745647498a23d8aeeb194d3a452767b626d31cf66fedc46cc7d7e5a2
                                                        • Opcode Fuzzy Hash: c880182ed6a44c636270805dcb1727134673603d52a4b7cbc7d445ce9927d35c
                                                        • Instruction Fuzzy Hash: F0711934E002199FDB54EBA9C980A9EBBF6FF84314F148529E405EB395DB34ED46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fa96400e6bd010976227ba82569e3208d6d6934ec20c3d832f8a3440f53d48ee
                                                        • Instruction ID: 7e84e40310e5e25ae4d9cb2a677abfbb3b708f962dda5c721f85bced80c01e1b
                                                        • Opcode Fuzzy Hash: fa96400e6bd010976227ba82569e3208d6d6934ec20c3d832f8a3440f53d48ee
                                                        • Instruction Fuzzy Hash: 1E616F30F002189FEF54ABA5C9147AEBAF6FFC8710F20842AE505AB395DA758D059B90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b78fd0e1eee942aa707551df27de122d46782f8d65b55d089fbc17263348eb13
                                                        • Instruction ID: be5d443109b9318cc6620e773581d43f61a7fd95cee7a91c27a9c79f993f7ade
                                                        • Opcode Fuzzy Hash: b78fd0e1eee942aa707551df27de122d46782f8d65b55d089fbc17263348eb13
                                                        • Instruction Fuzzy Hash: CA51E730B102248BFF65566CC9547AF3696D789B40F60452EE00ED77E9CEB9CC1583E2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 260a437cacaa5334a8872d5dd4aa68efdbf4b6c30289812c075365b6014a7866
                                                        • Instruction ID: c66578fe78d9fe7cf84491f96175f998fafc590d9965df828b752be30fa1310a
                                                        • Opcode Fuzzy Hash: 260a437cacaa5334a8872d5dd4aa68efdbf4b6c30289812c075365b6014a7866
                                                        • Instruction Fuzzy Hash: 7851CF31E00119CFDF64EB78E4446AEBBB2EF84315F20886DE106D7294DB759819CBE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6762a2d10c0cfed019bd1567302c7134755dac4ca6abc7213f3cfb86698aad0
                                                        • Instruction ID: c153c9e202af1cdd0764c6a151fba4e16207bec10a107325b4938a83f3b8288c
                                                        • Opcode Fuzzy Hash: d6762a2d10c0cfed019bd1567302c7134755dac4ca6abc7213f3cfb86698aad0
                                                        • Instruction Fuzzy Hash: B2517430B001159FDF54EB78D995BAE73F6EB88704F148469D809DB784EB359D02CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ca1032f1a1b9c4a833e961c38aaa6d367f74c007ee7e1558a44ce630edf4715a
                                                        • Instruction ID: 1ccdc116d6dc06936e4fe9c6fee3738c84f834d6db99755a47dcb6b00ea2c64d
                                                        • Opcode Fuzzy Hash: ca1032f1a1b9c4a833e961c38aaa6d367f74c007ee7e1558a44ce630edf4715a
                                                        • Instruction Fuzzy Hash: 4151C430B102248BFF64666CC99476F329AD789B54F60452EE00ED77E8CEB9CC4583E2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7afecffa8c3d5cbae31ef6ac1c66ad69e4f87119acf91408ee106fa272904b22
                                                        • Instruction ID: 0b7b95beb0ac980d67cafc72b831c99d28e3368e46800e568ddcec879058bdc4
                                                        • Opcode Fuzzy Hash: 7afecffa8c3d5cbae31ef6ac1c66ad69e4f87119acf91408ee106fa272904b22
                                                        • Instruction Fuzzy Hash: EB518F34E102258BDFA1CBA8C88076EF7A1FB45324F648926E019DB6C5C776E845CBE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20b24e046375790211043303354759dc72fd81e0aac57cd2b922caf1c07d55fc
                                                        • Instruction ID: 817cc9dbf2cdd71d698aedff8db2f9f5a7f6cff3f9766e94381fdfcb842cf04d
                                                        • Opcode Fuzzy Hash: 20b24e046375790211043303354759dc72fd81e0aac57cd2b922caf1c07d55fc
                                                        • Instruction Fuzzy Hash: 8D419370B002089FEF44AFA4C954B9EBBF6FF88710F20852AE105AB395DA758C05DB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a63af104383d2518ee676baa0410ae9e64f1fabe6877d2e55ccc0193710c539
                                                        • Instruction ID: dfd4b39c26c691e314da460f12af8e3be41a039d0dab44cd0a11b3d9ad980886
                                                        • Opcode Fuzzy Hash: 7a63af104383d2518ee676baa0410ae9e64f1fabe6877d2e55ccc0193710c539
                                                        • Instruction Fuzzy Hash: 3E415171E006199FDF70CED9D880AAFF7B2FB84324F10492AE115D3650D732A9598BE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf4a3645d47b9a12cc043ea7893133c506fe83e964e27576a8cc04053836c671
                                                        • Instruction ID: 0ade5beb7f16a86e41e10ab3f479bbcf9e9c637c78f5443e9cd31081ee07c1b5
                                                        • Opcode Fuzzy Hash: bf4a3645d47b9a12cc043ea7893133c506fe83e964e27576a8cc04053836c671
                                                        • Instruction Fuzzy Hash: CE416130E10214CFDB54DB68D494B9EBBF1EF89310F258469E40AEB3A2CA35DC45CBA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0503b4d5088b6eaf088c786a1276b46b7b6b2bab94834f25dd1ec7ee8c5e7e36
                                                        • Instruction ID: 821d65e3ca870e92f81b34788c1a2f05296dadd800b8f816f7bb0c2071ed494e
                                                        • Opcode Fuzzy Hash: 0503b4d5088b6eaf088c786a1276b46b7b6b2bab94834f25dd1ec7ee8c5e7e36
                                                        • Instruction Fuzzy Hash: D7418F70E1031A9BDB64DF65D85479EBBB6FF85740F208529D402EB280EF71A846CBD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 906172e4cda9428044d89cbae903df5c1a29fb3a5a1df794fd3e09502e03739f
                                                        • Instruction ID: a498d11e06c5768cf90675daecf7e726dd710de642e41049010b001cee972044
                                                        • Opcode Fuzzy Hash: 906172e4cda9428044d89cbae903df5c1a29fb3a5a1df794fd3e09502e03739f
                                                        • Instruction Fuzzy Hash: D7416D70E10114CFDB54DB68D494B9EBBF2EF88310F258469E40AEB3A2DA75DC45CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 26c9be006330d2bf05cdc2f105147e4ab9ac570dc2eef37afa24fedf1db3e312
                                                        • Instruction ID: e630cded7cf0e5143aeeeed75c2d6bb4a6fb0ab2eafeeef0755022ad98e16cec
                                                        • Opcode Fuzzy Hash: 26c9be006330d2bf05cdc2f105147e4ab9ac570dc2eef37afa24fedf1db3e312
                                                        • Instruction Fuzzy Hash: 3541C170E0035A9FDB15DF74D84469EBBB2FF86300F24852AD402EB280EF709806CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cef3ac56ecfd6089a0dc696b57c14ff5e08e71c743992107ed4cc3cbeef3f74e
                                                        • Instruction ID: 16e4d87d41fb81713d3df9959a4a507a2f5a5b47a80b9e1b961ae9b60860e0d1
                                                        • Opcode Fuzzy Hash: cef3ac56ecfd6089a0dc696b57c14ff5e08e71c743992107ed4cc3cbeef3f74e
                                                        • Instruction Fuzzy Hash: 68313570B002168FDB59AB74D9543AF37AAAF89610F148528D402EB791DF39DD0ACBE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 08b3ddd441721c72da438a35695d7ea490ef35a601a4f09409cfa5c9a83adb5b
                                                        • Instruction ID: 8ea827a27b218056f109abc20517feb7787ef1f7d6287d1d7b284153c6b8b349
                                                        • Opcode Fuzzy Hash: 08b3ddd441721c72da438a35695d7ea490ef35a601a4f09409cfa5c9a83adb5b
                                                        • Instruction Fuzzy Hash: FE31D430B102198FDB54AB74D91466F77AAAF89614F148528D402DB391DF35DD06C7E1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 877e55c384e84e314d4a797b4ab22afe0929ce78717883976102f392790d6a34
                                                        • Instruction ID: 08fb8313cc1191112d658065ac1adfe7288793dee41c10f65fb84f4fef3d3458
                                                        • Opcode Fuzzy Hash: 877e55c384e84e314d4a797b4ab22afe0929ce78717883976102f392790d6a34
                                                        • Instruction Fuzzy Hash: 6631A230E10215DBCB19CFA4D89569EB7B6BF89300F11C919E806EB790DB75AD46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dca8b0dbf3314a1c09e863f8d9a79b29bd87a2bb24abfbaef525f5005525e2c1
                                                        • Instruction ID: ae53987a21cde10fec92fea40743df68685a0dadd779d5b8c75581bc2678d899
                                                        • Opcode Fuzzy Hash: dca8b0dbf3314a1c09e863f8d9a79b29bd87a2bb24abfbaef525f5005525e2c1
                                                        • Instruction Fuzzy Hash: 2A315C30E10219DBCB19CFA5D89569EB7B6BF89300F118919E806E7390DB75AD46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e7f308fecf87e1003dc689f1d7c4d0e05d1c48361be1b5acd074aad38ed2a67
                                                        • Instruction ID: 419c1bebab66bd152bcfc7e04691ba7c1e0e1730862074fae7fedaf1b30ad582
                                                        • Opcode Fuzzy Hash: 5e7f308fecf87e1003dc689f1d7c4d0e05d1c48361be1b5acd074aad38ed2a67
                                                        • Instruction Fuzzy Hash: 63317F71E007199FDF70CEA9C8817AEF7F2FB84224F14492AE115D3680D775A9498BE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 861bbe4d99bf8f28a88d2f8d689dabb3008d06c744ceb6b0a3724a3f3b668b8c
                                                        • Instruction ID: 21530fce738f2716b75fb366047ed19d6d670b70b29011094681c90972ad38a8
                                                        • Opcode Fuzzy Hash: 861bbe4d99bf8f28a88d2f8d689dabb3008d06c744ceb6b0a3724a3f3b668b8c
                                                        • Instruction Fuzzy Hash: 03219D31F002199FEB50DF69E980AAEBBF6FB48710F148425E905E7394EB35D845CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 06252f83725580be1634ab6437482052ef9105328882f8759a24b5c2ee8b0535
                                                        • Instruction ID: 97596e33c0f2ccf2db1e18fa4fdbc850410229e9278d3c692d2e0735abb7f09b
                                                        • Opcode Fuzzy Hash: 06252f83725580be1634ab6437482052ef9105328882f8759a24b5c2ee8b0535
                                                        • Instruction Fuzzy Hash: 48219D75F0121A9FEB50DF69E980AAEBBF5FB48710F148125E905E7384E731D840CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb9394000ecb233704c8b228b3d59cdbce1d6665e24c681744809535d64f7214
                                                        • Instruction ID: 6ed409b2c4a17403cacf2380f567776ef7af805b2e1cfc520618f382b08b5ff3
                                                        • Opcode Fuzzy Hash: fb9394000ecb233704c8b228b3d59cdbce1d6665e24c681744809535d64f7214
                                                        • Instruction Fuzzy Hash: C411A135B141299FDF949A78DC146AE73EBEBC8310F018439D506E7384EE25DC068BE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf8633b1d3e8260c06782b61b77e901cb1a7ffe57733c0660b16812f51f771c6
                                                        • Instruction ID: 5b5282a0e0cfeccecd175aa8f656d4518808dd2f64eac7c18978625320491752
                                                        • Opcode Fuzzy Hash: bf8633b1d3e8260c06782b61b77e901cb1a7ffe57733c0660b16812f51f771c6
                                                        • Instruction Fuzzy Hash: B201F932B005201FEB21957D985475BB7EADBC5A10F14887BE40AC7381ED29DC0683E1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9aca4845f1a5f1a82001f3e67048a4a0a9405a365d55df3df56b0a2011005df7
                                                        • Instruction ID: 4e64eb99cab9118ae5a6abad635d913cd24b7e9486906b11a7724c6406f73696
                                                        • Opcode Fuzzy Hash: 9aca4845f1a5f1a82001f3e67048a4a0a9405a365d55df3df56b0a2011005df7
                                                        • Instruction Fuzzy Hash: C1012436B105215FCF229A3CD84076E73E6DFC9A10F104826F40AC7380EE29EC0683E1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 82153f4e07b658764118fd269982b1ca70b61d4240bbaceba4e8819e92286dc7
                                                        • Instruction ID: 36749a97241fe0dbafa1e6ff8fd94b393d117806e6ff3d539f80e434c517d275
                                                        • Opcode Fuzzy Hash: 82153f4e07b658764118fd269982b1ca70b61d4240bbaceba4e8819e92286dc7
                                                        • Instruction Fuzzy Hash: B521C0B5D01259ABDB10CF9AD884BDEFBB4FB48210F10812AE918A7240D379A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61915fae5357fc8a8c8f1c7a5d18e85d43767137fe24ee88078c629f4d4fd491
                                                        • Instruction ID: 1efc0da53c39db3e35b45e923f32cf93eb99173032ad7bd995e135a7ef9959c0
                                                        • Opcode Fuzzy Hash: 61915fae5357fc8a8c8f1c7a5d18e85d43767137fe24ee88078c629f4d4fd491
                                                        • Instruction Fuzzy Hash: 2901D635B004205BDF61E67CED9575EB3E6EB89B24F10882AE40AC7781DE29ED0683D4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1c5a934b56c17e5318f9865f7a4ca25bac7dac203f5edc08fc62f598b30c4ae
                                                        • Instruction ID: d5d15a896b848ab0857c417055906248a735679bc79c436c1a3549cc39db435a
                                                        • Opcode Fuzzy Hash: e1c5a934b56c17e5318f9865f7a4ca25bac7dac203f5edc08fc62f598b30c4ae
                                                        • Instruction Fuzzy Hash: 8E11CFB5D01219AFDB10CF9AD884BDEFBB4FB48310F10812AE918A7240C374A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eebd80c748b9a5f81cde2e23e8a7cf9b34f2a2d48b32de883641142d8732da0f
                                                        • Instruction ID: d1d031e277ea2be0808b1d90508d73a02d8e51234b8aef0c38ecda1263632958
                                                        • Opcode Fuzzy Hash: eebd80c748b9a5f81cde2e23e8a7cf9b34f2a2d48b32de883641142d8732da0f
                                                        • Instruction Fuzzy Hash: 8501D132B108215BEB65957ED80576BF3DADBC9B10F10883AE10EC7380ED69DC0643E1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 26ac83dda3689c6e8b31daeddc0c18d4edd7243c804e5329687f84b3cdc1e59a
                                                        • Instruction ID: ce2c56580525397f69d9627d7cbd64bdc8da58eb1f303d7447b12731a46e2c9d
                                                        • Opcode Fuzzy Hash: 26ac83dda3689c6e8b31daeddc0c18d4edd7243c804e5329687f84b3cdc1e59a
                                                        • Instruction Fuzzy Hash: 4901A736F140259BEF989568DD553EF33ABDBC8610F144536D50AE7284EE25DC0747E0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3226d222f41a767c76bebe0736a6f0cfb8c37e0daef78f00c2c2e5573ef2fd19
                                                        • Instruction ID: 8cde37b92ea74d6f7faa8192b2018519419ab2eb1f256b450558631495e4ca07
                                                        • Opcode Fuzzy Hash: 3226d222f41a767c76bebe0736a6f0cfb8c37e0daef78f00c2c2e5573ef2fd19
                                                        • Instruction Fuzzy Hash: 6001A431B109215BDF65AA3DD85576F73DADBC9A10F108839F10AC7380EE19EC0683D1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c613cd6c67b748f682124251274c62907ea7234708c815044f51083ae9878c20
                                                        • Instruction ID: a2650a74b6b82633fbfa3da041ef95da10d89103bf74ef0385a899d4982514b7
                                                        • Opcode Fuzzy Hash: c613cd6c67b748f682124251274c62907ea7234708c815044f51083ae9878c20
                                                        • Instruction Fuzzy Hash: 5B01842292D3945FEB429E789D623CA3B619F93225F1504E7C444CF283E5288949C7A5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d52ce47f916621fd80670371e1447522a9ee76a641f0faf9011d793bc38704f8
                                                        • Instruction ID: 498c555be31ac1f5353b5434b43ba4e704284a848b663b79f5eb396fa21e61b3
                                                        • Opcode Fuzzy Hash: d52ce47f916621fd80670371e1447522a9ee76a641f0faf9011d793bc38704f8
                                                        • Instruction Fuzzy Hash: 8801AF30B101205BDF61EA7CDC55B2EB3E6EB89B14F10882AE40AC7784DE29EC0687D4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29d316ca667922da3d61dafa7464d0deace9570a05953245276a6da096b65d57
                                                        • Instruction ID: cce4b0b632220f423e445833e4a1951328a6729f7cc3df448ae0ea732d546d4c
                                                        • Opcode Fuzzy Hash: 29d316ca667922da3d61dafa7464d0deace9570a05953245276a6da096b65d57
                                                        • Instruction Fuzzy Hash: 7E01C832F10234ABCF28AA69ED41A9EB779FB85754F004539E915E7384DB35A805CBD0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac793f00a224cdf71a9e0c00df6fa115437c53c6743e9732653789e0d034afb0
                                                        • Instruction ID: 210525233ea81e5c3c7dba43b9da76c010564b359ebcc3913e4d505c63ae1eb8
                                                        • Opcode Fuzzy Hash: ac793f00a224cdf71a9e0c00df6fa115437c53c6743e9732653789e0d034afb0
                                                        • Instruction Fuzzy Hash: 53F0FE30A10229DFDB14DF94E859BAEBBB2FF48701F204119E406A7291CBB41C45DFD0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.1436868181.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_63e0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3eb8930aa85eaf97269b5899c0c8ef78ab01aaaf59dbb156fc85de883b627701
                                                        • Instruction ID: b0afa36e8be90e6a1b7f2bf2642185b6104ee2c39c1af8a040d7ce6fd7e36aeb
                                                        • Opcode Fuzzy Hash: 3eb8930aa85eaf97269b5899c0c8ef78ab01aaaf59dbb156fc85de883b627701
                                                        • Instruction Fuzzy Hash: E1E0C270E2411CABDF50DEB4CE0775E73ADDB53214F2088A6D408C7281F172DA058BE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:10.5%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:317
                                                        Total number of Limit Nodes:21
                                                        execution_graph 38587 5267364 38588 526736b 38587->38588 38589 5267e25 38588->38589 38590 5267dff 38588->38590 38591 5267dd7 38588->38591 38594 2b47250 38589->38594 38590->38591 38593 2b47250 CreateWindowExW 38590->38593 38593->38591 38596 2b4725b 38594->38596 38595 2b48a31 38595->38591 38596->38595 38599 2b4cd90 38596->38599 38605 2b4cd80 38596->38605 38600 2b4cdb1 38599->38600 38601 2b4cdd5 38600->38601 38612 2b4d3a1 38600->38612 38617 2b4d339 38600->38617 38621 2b4d348 38600->38621 38601->38595 38606 2b4cd46 38605->38606 38607 2b4cd86 38605->38607 38606->38595 38608 2b4cdd5 38607->38608 38609 2b4d3a1 CreateWindowExW 38607->38609 38610 2b4d348 CreateWindowExW 38607->38610 38611 2b4d339 CreateWindowExW 38607->38611 38608->38595 38609->38608 38610->38608 38611->38608 38613 2b4d3d5 38612->38613 38614 2b4d360 38612->38614 38613->38601 38616 2b4d38f 38614->38616 38625 2b4d170 38614->38625 38616->38601 38618 2b4d348 38617->38618 38619 2b4d38f 38618->38619 38620 2b4d170 CreateWindowExW 38618->38620 38619->38601 38620->38619 38622 2b4d355 38621->38622 38623 2b4d38f 38622->38623 38624 2b4d170 CreateWindowExW 38622->38624 38623->38601 38624->38623 38626 2b4d175 38625->38626 38628 2b4dca0 38626->38628 38629 2b4d29c 38626->38629 38630 2b4d2a7 38629->38630 38631 2b47250 CreateWindowExW 38630->38631 38632 2b4dd0f 38631->38632 38636 2b4fa88 38632->38636 38643 2b4faa0 38632->38643 38633 2b4dd49 38633->38628 38638 2b4fbd1 38636->38638 38639 2b4fad1 38636->38639 38637 2b4fadd 38637->38633 38638->38633 38639->38637 38650 52609b3 38639->38650 38655 52609af 38639->38655 38660 52609c0 38639->38660 38645 2b4fad1 38643->38645 38646 2b4fbd1 38643->38646 38644 2b4fadd 38644->38633 38645->38644 38647 52609b3 CreateWindowExW 38645->38647 38648 52609c0 CreateWindowExW 38645->38648 38649 52609af CreateWindowExW 38645->38649 38646->38633 38647->38646 38648->38646 38649->38646 38652 52609eb 38650->38652 38651 5260a9a 38651->38651 38652->38651 38665 5261ca0 38652->38665 38668 5261c90 38652->38668 38656 52609cf 38655->38656 38657 5260a9a 38656->38657 38658 5261ca0 CreateWindowExW 38656->38658 38659 5261c90 CreateWindowExW 38656->38659 38658->38657 38659->38657 38661 52609eb 38660->38661 38662 5260a9a 38661->38662 38663 5261ca0 CreateWindowExW 38661->38663 38664 5261c90 CreateWindowExW 38661->38664 38663->38662 38664->38662 38671 5261130 38665->38671 38669 5261cd5 38668->38669 38670 5261130 CreateWindowExW 38668->38670 38669->38651 38670->38669 38672 5261cf0 CreateWindowExW 38671->38672 38674 5261e14 38672->38674 38674->38674 38704 2b44dd0 38706 2b44df7 38704->38706 38705 2b44ed4 38705->38705 38706->38705 38708 2b4450c 38706->38708 38709 2b45e60 CreateActCtxA 38708->38709 38711 2b45f23 38709->38711 38712 fad01c 38713 fad034 38712->38713 38714 fad08e 38713->38714 38719 526115c 38713->38719 38728 5261e98 38713->38728 38732 5261ea8 38713->38732 38736 5262c0a 38713->38736 38720 5261167 38719->38720 38721 5262c79 38720->38721 38723 5262c69 38720->38723 38761 5261284 38721->38761 38745 5262da0 38723->38745 38750 5262e6c 38723->38750 38756 5262d90 38723->38756 38724 5262c77 38729 5261ece 38728->38729 38730 526115c CallWindowProcW 38729->38730 38731 5261eef 38730->38731 38731->38714 38733 5261ece 38732->38733 38734 526115c CallWindowProcW 38733->38734 38735 5261eef 38734->38735 38735->38714 38739 5262c45 38736->38739 38737 5262c79 38738 5261284 CallWindowProcW 38737->38738 38741 5262c77 38738->38741 38739->38737 38740 5262c69 38739->38740 38742 5262da0 CallWindowProcW 38740->38742 38743 5262d90 CallWindowProcW 38740->38743 38744 5262e6c CallWindowProcW 38740->38744 38742->38741 38743->38741 38744->38741 38747 5262db4 38745->38747 38746 5262e40 38746->38724 38765 5262e58 38747->38765 38768 5262e49 38747->38768 38751 5262e2a 38750->38751 38752 5262e7a 38750->38752 38754 5262e58 CallWindowProcW 38751->38754 38755 5262e49 CallWindowProcW 38751->38755 38753 5262e40 38753->38724 38754->38753 38755->38753 38758 5262db4 38756->38758 38757 5262e40 38757->38724 38759 5262e58 CallWindowProcW 38758->38759 38760 5262e49 CallWindowProcW 38758->38760 38759->38757 38760->38757 38762 526128f 38761->38762 38763 526435a CallWindowProcW 38762->38763 38764 5264309 38762->38764 38763->38764 38764->38724 38767 5262e69 38765->38767 38771 5264291 38765->38771 38767->38746 38769 5262e69 38768->38769 38770 5264291 CallWindowProcW 38768->38770 38769->38746 38770->38769 38772 5261284 CallWindowProcW 38771->38772 38773 52642aa 38772->38773 38773->38767 38774 5268fc0 38775 5268fe2 38774->38775 38776 2b47250 CreateWindowExW 38774->38776 38776->38775 38777 2b4b0d8 38781 2b4b1d0 38777->38781 38789 2b4b1c0 38777->38789 38778 2b4b0e7 38782 2b4b1e1 38781->38782 38783 2b4b204 38781->38783 38782->38783 38797 2b4b468 38782->38797 38801 2b4b459 38782->38801 38783->38778 38784 2b4b1fc 38784->38783 38785 2b4b408 GetModuleHandleW 38784->38785 38786 2b4b435 38785->38786 38786->38778 38790 2b4b1e1 38789->38790 38791 2b4b204 38789->38791 38790->38791 38795 2b4b468 LoadLibraryExW 38790->38795 38796 2b4b459 LoadLibraryExW 38790->38796 38791->38778 38792 2b4b1fc 38792->38791 38793 2b4b408 GetModuleHandleW 38792->38793 38794 2b4b435 38793->38794 38794->38778 38795->38792 38796->38792 38798 2b4b47c 38797->38798 38799 2b4b4a1 38798->38799 38805 2b4aee8 38798->38805 38799->38784 38802 2b4b47c 38801->38802 38803 2b4aee8 LoadLibraryExW 38802->38803 38804 2b4b4a1 38802->38804 38803->38804 38804->38784 38807 2b4b648 LoadLibraryExW 38805->38807 38808 2b4b6c1 38807->38808 38808->38799 38809 9851128 38810 9851152 38809->38810 38814 98514a0 38810->38814 38830 985149c 38810->38830 38811 9851176 38815 98514b5 38814->38815 38823 98514c7 38815->38823 38846 9851be6 38815->38846 38851 985183b 38815->38851 38855 9851d9b 38815->38855 38859 9851b1b 38815->38859 38863 9851638 38815->38863 38869 98515bf 38815->38869 38874 9851e12 38815->38874 38878 98517d3 38815->38878 38886 9851d11 38815->38886 38890 9851f57 38815->38890 38895 98516d5 38815->38895 38899 985202f 38815->38899 38904 9851b2f 38815->38904 38823->38811 38831 98514a0 38830->38831 38832 9851be6 2 API calls 38831->38832 38833 9851b2f 2 API calls 38831->38833 38834 985202f 2 API calls 38831->38834 38835 98516d5 2 API calls 38831->38835 38836 9851f57 2 API calls 38831->38836 38837 9851d11 2 API calls 38831->38837 38838 98517d3 4 API calls 38831->38838 38839 9851e12 2 API calls 38831->38839 38840 98514c7 38831->38840 38841 98515bf 2 API calls 38831->38841 38842 9851638 2 API calls 38831->38842 38843 9851b1b 2 API calls 38831->38843 38844 9851d9b 2 API calls 38831->38844 38845 985183b 2 API calls 38831->38845 38832->38840 38833->38840 38834->38840 38835->38840 38836->38840 38837->38840 38838->38840 38839->38840 38840->38811 38841->38840 38842->38840 38843->38840 38844->38840 38845->38840 38847 9851bec 38846->38847 38908 973e7b0 38847->38908 38912 973e7b8 38847->38912 38848 9851f00 38916 973e6f0 38851->38916 38920 973e6f8 38851->38920 38852 9851859 38852->38823 38856 9851d29 38855->38856 38924 973dd00 38856->38924 38928 973dcf9 38856->38928 38860 9851b28 38859->38860 38861 973dd00 ResumeThread 38860->38861 38862 973dcf9 ResumeThread 38860->38862 38861->38860 38862->38860 38865 98515c8 38863->38865 38864 9852118 38864->38823 38865->38864 38932 973ea40 38865->38932 38936 973ea34 38865->38936 38870 98515c8 38869->38870 38872 973ea40 CreateProcessA 38870->38872 38873 973ea34 CreateProcessA 38870->38873 38871 9851689 38871->38823 38872->38871 38873->38871 38876 973e7b0 WriteProcessMemory 38874->38876 38877 973e7b8 WriteProcessMemory 38874->38877 38875 9851e36 38876->38875 38877->38875 38879 98517f6 38878->38879 38882 973e7b0 WriteProcessMemory 38879->38882 38883 973e7b8 WriteProcessMemory 38879->38883 38880 9851e0c 38880->38823 38881 98516b4 38881->38823 38881->38880 38940 973e1e0 38881->38940 38944 973e1e8 38881->38944 38882->38881 38883->38881 38887 9851d17 38886->38887 38888 973dd00 ResumeThread 38887->38888 38889 973dcf9 ResumeThread 38887->38889 38888->38887 38889->38887 38893 973e1e0 Wow64SetThreadContext 38890->38893 38894 973e1e8 Wow64SetThreadContext 38890->38894 38891 9851f4f 38891->38823 38892 98516b4 38892->38823 38892->38890 38892->38891 38893->38892 38894->38892 38948 973e8a0 38895->38948 38952 973e8a8 38895->38952 38896 9851701 38896->38823 38901 9851d28 38899->38901 38900 9852043 38901->38900 38902 973dd00 ResumeThread 38901->38902 38903 973dcf9 ResumeThread 38901->38903 38902->38901 38903->38901 38906 973e1e0 Wow64SetThreadContext 38904->38906 38907 973e1e8 Wow64SetThreadContext 38904->38907 38905 9851b49 38906->38905 38907->38905 38909 973e7b8 WriteProcessMemory 38908->38909 38911 973e857 38909->38911 38911->38848 38913 973e800 WriteProcessMemory 38912->38913 38915 973e857 38913->38915 38915->38848 38917 973e6f8 VirtualAllocEx 38916->38917 38919 973e775 38917->38919 38919->38852 38921 973e738 VirtualAllocEx 38920->38921 38923 973e775 38921->38923 38923->38852 38925 973dd40 ResumeThread 38924->38925 38927 973dd71 38925->38927 38927->38856 38929 973dd00 ResumeThread 38928->38929 38931 973dd71 38929->38931 38931->38856 38933 973eac9 38932->38933 38933->38933 38934 973ec2e CreateProcessA 38933->38934 38935 973ec8b 38934->38935 38937 973eac9 38936->38937 38937->38937 38938 973ec2e CreateProcessA 38937->38938 38939 973ec8b 38938->38939 38941 973e1e8 Wow64SetThreadContext 38940->38941 38943 973e275 38941->38943 38943->38881 38945 973e22d Wow64SetThreadContext 38944->38945 38947 973e275 38945->38947 38947->38881 38949 973e8a8 ReadProcessMemory 38948->38949 38951 973e937 38949->38951 38951->38896 38953 973e8f3 ReadProcessMemory 38952->38953 38955 973e937 38953->38955 38955->38896 38689 2b4d460 38690 2b4d4a6 38689->38690 38694 2b4d630 38690->38694 38698 2b4d640 38690->38698 38691 2b4d593 38695 2b4d640 38694->38695 38701 2b4d238 38695->38701 38699 2b4d238 DuplicateHandle 38698->38699 38700 2b4d66e 38699->38700 38700->38691 38702 2b4d6a8 DuplicateHandle 38701->38702 38703 2b4d66e 38702->38703 38703->38691 38956 2b447c0 38957 2b447c9 38956->38957 38960 2b44420 38957->38960 38959 2b447ea 38961 2b4442b 38960->38961 38964 2b45c54 38961->38964 38963 2b470fd 38963->38959 38965 2b45c5f 38964->38965 38968 2b45c74 38965->38968 38967 2b4719d 38967->38963 38969 2b45c7f 38968->38969 38972 2b47220 38969->38972 38971 2b4768a 38971->38967 38973 2b4722b 38972->38973 38974 2b47250 CreateWindowExW 38973->38974 38975 2b47785 38974->38975 38975->38971 38976 98523f0 38977 985257b 38976->38977 38978 9852416 38976->38978 38978->38977 38981 9852670 PostMessageW 38978->38981 38983 9852668 38978->38983 38982 98526dc 38981->38982 38982->38978 38984 9852670 PostMessageW 38983->38984 38985 98526dc 38984->38985 38985->38978 38986 5267098 38989 52670cf 38986->38989 38987 52670d4 38987->38987 38988 52669e8 CreateWindowExW 38988->38989 38989->38987 38989->38988 38990 5267d64 38989->38990 38991 5267e25 38990->38991 38992 5267dff 38990->38992 38993 5267dd7 38990->38993 38994 2b47250 CreateWindowExW 38991->38994 38992->38993 38995 2b47250 CreateWindowExW 38992->38995 38994->38993 38995->38993 38996 52671d9 38997 52671ec 38996->38997 38998 5267e25 38997->38998 38999 5267dff 38997->38999 39000 5267dd7 38997->39000 39002 2b47250 CreateWindowExW 38998->39002 38999->39000 39001 2b47250 CreateWindowExW 38999->39001 39001->39000 39002->39000

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 973ea34-973ead5 2 973ead7-973eae1 0->2 3 973eb0e-973eb2e 0->3 2->3 4 973eae3-973eae5 2->4 8 973eb30-973eb3a 3->8 9 973eb67-973eb96 3->9 6 973eae7-973eaf1 4->6 7 973eb08-973eb0b 4->7 10 973eaf3 6->10 11 973eaf5-973eb04 6->11 7->3 8->9 12 973eb3c-973eb3e 8->12 19 973eb98-973eba2 9->19 20 973ebcf-973ec89 CreateProcessA 9->20 10->11 11->11 13 973eb06 11->13 14 973eb61-973eb64 12->14 15 973eb40-973eb4a 12->15 13->7 14->9 17 973eb4e-973eb5d 15->17 18 973eb4c 15->18 17->17 21 973eb5f 17->21 18->17 19->20 22 973eba4-973eba6 19->22 31 973ec92-973ed18 20->31 32 973ec8b-973ec91 20->32 21->14 24 973ebc9-973ebcc 22->24 25 973eba8-973ebb2 22->25 24->20 26 973ebb6-973ebc5 25->26 27 973ebb4 25->27 26->26 28 973ebc7 26->28 27->26 28->24 42 973ed1a-973ed1e 31->42 43 973ed28-973ed2c 31->43 32->31 42->43 46 973ed20 42->46 44 973ed2e-973ed32 43->44 45 973ed3c-973ed40 43->45 44->45 47 973ed34 44->47 48 973ed42-973ed46 45->48 49 973ed50-973ed54 45->49 46->43 47->45 48->49 50 973ed48 48->50 51 973ed66-973ed6d 49->51 52 973ed56-973ed5c 49->52 50->49 53 973ed84 51->53 54 973ed6f-973ed7e 51->54 52->51 55 973ed85 53->55 54->53 55->55
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0973EC76
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 1c3bb86be2f3391e2bd452b484a7f64739834b4d484565b07da1dbed99231ee0
                                                        • Instruction ID: 551654f773af0e756060b367b1375a3570399feb466f25af1586a3c2ae618faf
                                                        • Opcode Fuzzy Hash: 1c3bb86be2f3391e2bd452b484a7f64739834b4d484565b07da1dbed99231ee0
                                                        • Instruction Fuzzy Hash: A8A16D72D00219CFEF21CF68C841BDEBBB2BF44310F5485A9E859A7281DB759985CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 57 973ea40-973ead5 59 973ead7-973eae1 57->59 60 973eb0e-973eb2e 57->60 59->60 61 973eae3-973eae5 59->61 65 973eb30-973eb3a 60->65 66 973eb67-973eb96 60->66 63 973eae7-973eaf1 61->63 64 973eb08-973eb0b 61->64 67 973eaf3 63->67 68 973eaf5-973eb04 63->68 64->60 65->66 69 973eb3c-973eb3e 65->69 76 973eb98-973eba2 66->76 77 973ebcf-973ec89 CreateProcessA 66->77 67->68 68->68 70 973eb06 68->70 71 973eb61-973eb64 69->71 72 973eb40-973eb4a 69->72 70->64 71->66 74 973eb4e-973eb5d 72->74 75 973eb4c 72->75 74->74 78 973eb5f 74->78 75->74 76->77 79 973eba4-973eba6 76->79 88 973ec92-973ed18 77->88 89 973ec8b-973ec91 77->89 78->71 81 973ebc9-973ebcc 79->81 82 973eba8-973ebb2 79->82 81->77 83 973ebb6-973ebc5 82->83 84 973ebb4 82->84 83->83 85 973ebc7 83->85 84->83 85->81 99 973ed1a-973ed1e 88->99 100 973ed28-973ed2c 88->100 89->88 99->100 103 973ed20 99->103 101 973ed2e-973ed32 100->101 102 973ed3c-973ed40 100->102 101->102 104 973ed34 101->104 105 973ed42-973ed46 102->105 106 973ed50-973ed54 102->106 103->100 104->102 105->106 107 973ed48 105->107 108 973ed66-973ed6d 106->108 109 973ed56-973ed5c 106->109 107->106 110 973ed84 108->110 111 973ed6f-973ed7e 108->111 109->108 112 973ed85 110->112 111->110 112->112
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0973EC76
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 2116d76e3191e5e85a6a6d0356357c424ef9fe8f3e0e719b278552efedd850fe
                                                        • Instruction ID: 1549ac76ca04a799473830d927e451e5f4d5e30a1650880060832ed0b5516979
                                                        • Opcode Fuzzy Hash: 2116d76e3191e5e85a6a6d0356357c424ef9fe8f3e0e719b278552efedd850fe
                                                        • Instruction Fuzzy Hash: 31915C72D00219CFEF21CF68C841BDEBBB2BF48310F5485A9E859A7281DB759985CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 114 2b4b1d0-2b4b1df 115 2b4b1e1-2b4b1ee call 2b4ae84 114->115 116 2b4b20b-2b4b20f 114->116 122 2b4b204 115->122 123 2b4b1f0 115->123 118 2b4b211-2b4b21b 116->118 119 2b4b223-2b4b264 116->119 118->119 125 2b4b266-2b4b26e 119->125 126 2b4b271-2b4b27f 119->126 122->116 169 2b4b1f6 call 2b4b468 123->169 170 2b4b1f6 call 2b4b459 123->170 125->126 127 2b4b281-2b4b286 126->127 128 2b4b2a3-2b4b2a5 126->128 130 2b4b291 127->130 131 2b4b288-2b4b28f call 2b4ae90 127->131 133 2b4b2a8-2b4b2af 128->133 129 2b4b1fc-2b4b1fe 129->122 132 2b4b340-2b4b400 129->132 135 2b4b293-2b4b2a1 130->135 131->135 164 2b4b402-2b4b405 132->164 165 2b4b408-2b4b433 GetModuleHandleW 132->165 136 2b4b2b1-2b4b2b9 133->136 137 2b4b2bc-2b4b2c3 133->137 135->133 136->137 140 2b4b2c5-2b4b2cd 137->140 141 2b4b2d0-2b4b2d9 call 2b4aea0 137->141 140->141 145 2b4b2e6-2b4b2eb 141->145 146 2b4b2db-2b4b2e3 141->146 147 2b4b2ed-2b4b2f4 145->147 148 2b4b309-2b4b316 145->148 146->145 147->148 150 2b4b2f6-2b4b306 call 2b4aeb0 call 2b4aec0 147->150 155 2b4b318-2b4b336 148->155 156 2b4b339-2b4b33f 148->156 150->148 155->156 164->165 166 2b4b435-2b4b43b 165->166 167 2b4b43c-2b4b450 165->167 166->167 169->129 170->129
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 02B4B426
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: ca0698d0b4516315676b44c306803765fc3d78e460778f5a490d6bb5693e8912
                                                        • Instruction ID: 93ef106a38813db8a44cf023c586443e7080526000cf598656b55f5e426f7742
                                                        • Opcode Fuzzy Hash: ca0698d0b4516315676b44c306803765fc3d78e460778f5a490d6bb5693e8912
                                                        • Instruction Fuzzy Hash: 02714670A00B058FEB24DF6AD18175ABBF1FF88308F108A6DD59AD7A50DB74E945CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 171 52610e8-526112e 177 5261130-5261d56 171->177 178 526119d 171->178 183 5261d61-5261d68 177->183 184 5261d58-5261d5e 177->184 179 526119f 178->179 180 526120c-526255a 178->180 185 5261d73-5261dab 183->185 186 5261d6a-5261d70 183->186 184->183 188 5261db3-5261e12 CreateWindowExW 185->188 186->185 189 5261e14-5261e1a 188->189 190 5261e1b-5261e53 188->190 189->190 194 5261e55-5261e58 190->194 195 5261e60 190->195 194->195 196 5261e61 195->196 196->196
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05261E02
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1451616599.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_5260000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 76d75402a07e4cbb62b406322c6f6765cc3347599ef7399435609646f1d183ad
                                                        • Instruction ID: f1a2a9114f0533cc8b76bdacef554f4f35981df6ebfd0d8aef910aeaa9261f25
                                                        • Opcode Fuzzy Hash: 76d75402a07e4cbb62b406322c6f6765cc3347599ef7399435609646f1d183ad
                                                        • Instruction Fuzzy Hash: 865136B1C143599FEB10CFA9C880ACEBBF1BF88710F24811AE418AB351D774A995CF95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 197 5261ce4-5261d56 198 5261d61-5261d68 197->198 199 5261d58-5261d5e 197->199 200 5261d73-5261dab 198->200 201 5261d6a-5261d70 198->201 199->198 202 5261db3-5261e12 CreateWindowExW 200->202 201->200 203 5261e14-5261e1a 202->203 204 5261e1b-5261e53 202->204 203->204 208 5261e55-5261e58 204->208 209 5261e60 204->209 208->209 210 5261e61 209->210 210->210
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05261E02
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1451616599.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_5260000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 4a004678c08d40e60ac1649a11ad3e3808f43d1d3ddbc4ee6d41b3d374187671
                                                        • Instruction ID: 53449bfcf4974414cd41f7a1a736d01dab907c67611d836a453276d0ce1e974e
                                                        • Opcode Fuzzy Hash: 4a004678c08d40e60ac1649a11ad3e3808f43d1d3ddbc4ee6d41b3d374187671
                                                        • Instruction Fuzzy Hash: 5C51C3B1D10349DFDB14CFA9C884ADEBBB5FF48710F24812AE819AB250D775A985CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 211 5261130-5261d56 213 5261d61-5261d68 211->213 214 5261d58-5261d5e 211->214 215 5261d73-5261e12 CreateWindowExW 213->215 216 5261d6a-5261d70 213->216 214->213 218 5261e14-5261e1a 215->218 219 5261e1b-5261e53 215->219 216->215 218->219 223 5261e55-5261e58 219->223 224 5261e60 219->224 223->224 225 5261e61 224->225 225->225
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05261E02
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1451616599.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_5260000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 3e00ec5198f5b1421753252b67126c0d4fb022af409cadc38bd28e3a858d765f
                                                        • Instruction ID: ca080a935e061a859e43ee2ff214d174ae9e4ba4b63f034bdf8c7af32a37ffdc
                                                        • Opcode Fuzzy Hash: 3e00ec5198f5b1421753252b67126c0d4fb022af409cadc38bd28e3a858d765f
                                                        • Instruction Fuzzy Hash: 2251B1B1D10349DFDB14CF99C884ADEBBB6BF48310F64812AE819AB250D775A895CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 226 2b45e55-2b45f21 CreateActCtxA 228 2b45f23-2b45f29 226->228 229 2b45f2a-2b45f84 226->229 228->229 236 2b45f86-2b45f89 229->236 237 2b45f93-2b45f97 229->237 236->237 238 2b45fa8 237->238 239 2b45f99-2b45fa5 237->239 241 2b45fa9 238->241 239->238 241->241
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 02B45F11
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 0a4465ac9585d40dcf10e712fbd23320ef9936264857dd1670d851a3d027a0e4
                                                        • Instruction ID: ef5862ab2c318aa6e1970f939f72c9cc2422b9a2601e6ce835eb7ee0d428aa8d
                                                        • Opcode Fuzzy Hash: 0a4465ac9585d40dcf10e712fbd23320ef9936264857dd1670d851a3d027a0e4
                                                        • Instruction Fuzzy Hash: 7241CFB0C00619CFDB24CFA9C9847DEBBB5FF48304F60856AD408AB251DB756946CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 242 5261284-52642fc 245 5264302-5264307 242->245 246 52643ac-52643cc call 526115c 242->246 247 526435a-5264392 CallWindowProcW 245->247 248 5264309-5264340 245->248 253 52643cf-52643dc 246->253 251 5264394-526439a 247->251 252 526439b-52643aa 247->252 255 5264342-5264348 248->255 256 5264349-5264358 248->256 251->252 252->253 255->256 256->253
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05264381
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1451616599.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_5260000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 31e4b8dea3a59f5049104566db1156f4c132fc8c4c9868a96c1e2da7069bcbd5
                                                        • Instruction ID: 83e58379bbd3b6ccbb6ee35c0b5ce59fe4d0053ed5dae6f90ff75479d9ebec21
                                                        • Opcode Fuzzy Hash: 31e4b8dea3a59f5049104566db1156f4c132fc8c4c9868a96c1e2da7069bcbd5
                                                        • Instruction Fuzzy Hash: 7D415BB4910305CFDB14DF95C488AAAFBF5FF88314F248449E559AB360D774A881CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 259 2b4450c-2b45f21 CreateActCtxA 262 2b45f23-2b45f29 259->262 263 2b45f2a-2b45f84 259->263 262->263 270 2b45f86-2b45f89 263->270 271 2b45f93-2b45f97 263->271 270->271 272 2b45fa8 271->272 273 2b45f99-2b45fa5 271->273 275 2b45fa9 272->275 273->272 275->275
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 02B45F11
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: b72f12dce1aaedff9b135f901d0e7a7a874412876addc8bbdcd343a311cd58eb
                                                        • Instruction ID: f862588b6626d552387762e6df6957b17ce4e9f4fc135d48cae6f68f2fa7d720
                                                        • Opcode Fuzzy Hash: b72f12dce1aaedff9b135f901d0e7a7a874412876addc8bbdcd343a311cd58eb
                                                        • Instruction Fuzzy Hash: 7141B170D00719CBDB24CFAAC884BDEBBB5FF48304F60856AD408AB251DB756945CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 276 973e7b0-973e806 279 973e816-973e855 WriteProcessMemory 276->279 280 973e808-973e814 276->280 282 973e857-973e85d 279->282 283 973e85e-973e88e 279->283 280->279 282->283
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0973E848
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: cbabdd68e01257222bd726d80b064c6c9fc9c479d96301116d2ed5a3038a8204
                                                        • Instruction ID: 5de767e8fe4712a947c6325bb058ebf0c25f57fcfc08e0a6173bac68bcef1097
                                                        • Opcode Fuzzy Hash: cbabdd68e01257222bd726d80b064c6c9fc9c479d96301116d2ed5a3038a8204
                                                        • Instruction Fuzzy Hash: F22135729003499FDB10CFAAC881BDEBBF5FF48310F10842AE918A7240D779A945CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 287 973e7b8-973e806 289 973e816-973e855 WriteProcessMemory 287->289 290 973e808-973e814 287->290 292 973e857-973e85d 289->292 293 973e85e-973e88e 289->293 290->289 292->293
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0973E848
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 95c813d41757389250b23d48acbdcca40d53732d78395fe08fcda03fd6e11f80
                                                        • Instruction ID: 034eacfe85dc9885facadf0c103453e0ad046bd15af213c3349dda7d1ffb1d9a
                                                        • Opcode Fuzzy Hash: 95c813d41757389250b23d48acbdcca40d53732d78395fe08fcda03fd6e11f80
                                                        • Instruction Fuzzy Hash: 3D212472D003499FDB10CFAAC881BDEBBF5FF48310F10842AE918A7241D7799944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 308 973e8a0-973e935 ReadProcessMemory 312 973e937-973e93d 308->312 313 973e93e-973e96e 308->313 312->313
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0973E928
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 863525aa47617d6a4786c3234e657998f8328043ce7093b04916ce9276aed5e3
                                                        • Instruction ID: dee52949ab0b6691946b5193e2fd0853b6433f54fcb40aa907b0fe0b0010138f
                                                        • Opcode Fuzzy Hash: 863525aa47617d6a4786c3234e657998f8328043ce7093b04916ce9276aed5e3
                                                        • Instruction Fuzzy Hash: B72128728003499FDB10DFAAC881BDEBBF5FF48310F50842AE519A7250D7799545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 297 973e1e0-973e233 300 973e243-973e273 Wow64SetThreadContext 297->300 301 973e235-973e241 297->301 303 973e275-973e27b 300->303 304 973e27c-973e2ac 300->304 301->300 303->304
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0973E266
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 489d0b2932a606eded1e9f2ff320eca933eddd46c09d47a9aa234209b345159c
                                                        • Instruction ID: 1c13d9eae707bb24a110660603b3278684356abfc64ddf37218f98c588f95686
                                                        • Opcode Fuzzy Hash: 489d0b2932a606eded1e9f2ff320eca933eddd46c09d47a9aa234209b345159c
                                                        • Instruction Fuzzy Hash: 26213872D003098FDB14DFAAC8857EEBBF4EF48214F54842AE519A7641CB78A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 317 2b4d238-2b4d73c DuplicateHandle 319 2b4d745-2b4d762 317->319 320 2b4d73e-2b4d744 317->320 320->319
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B4D66E,?,?,?,?,?), ref: 02B4D72F
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 6907a9175dd12aaf138d1c02e94d2fed11887c50c2f3f601136dafa81822a97f
                                                        • Instruction ID: 326dcc5cfe356d5ed3b3d4ec566b2a63442419ed20b9a3e38ec6e078b5e6f394
                                                        • Opcode Fuzzy Hash: 6907a9175dd12aaf138d1c02e94d2fed11887c50c2f3f601136dafa81822a97f
                                                        • Instruction Fuzzy Hash: B221E6B59003499FDB10CFAAD584ADEFBF4EF48310F14805AE918A3350D774A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 323 2b4d6a1-2b4d6a3 324 2b4d6a8-2b4d73c DuplicateHandle 323->324 325 2b4d745-2b4d762 324->325 326 2b4d73e-2b4d744 324->326 326->325
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B4D66E,?,?,?,?,?), ref: 02B4D72F
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 9f578899cee1ab3eb0350c306b5814c7fc69fe1edbed3c68eae53b9411984d25
                                                        • Instruction ID: ab276bbe0d2b9499bd0f6a69217ce7fa10aa252e03d935baf8b6443ec3fd7209
                                                        • Opcode Fuzzy Hash: 9f578899cee1ab3eb0350c306b5814c7fc69fe1edbed3c68eae53b9411984d25
                                                        • Instruction Fuzzy Hash: BB21E4B5D00249AFDB10CFAAD984ADEBBF8FB48310F14805AE914A3350D378A954CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0973E928
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: cb7cb3fe23a2c9fded85da4fc0135b99b21e38f664e85231d9cd39e11c9fae3e
                                                        • Instruction ID: 8bf26e98d685e14569b070636aa073caa0c76f17e8a16acd0904e441d40147dd
                                                        • Opcode Fuzzy Hash: cb7cb3fe23a2c9fded85da4fc0135b99b21e38f664e85231d9cd39e11c9fae3e
                                                        • Instruction Fuzzy Hash: BA2128728003499FDB10CFAAC880BDEBBF5FF48310F50842AE518A7240D7799500CBA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0973E266
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 8192be1b5c038c594b461f27f246c970943d88fef77fefb47cb2d5b518b9aef2
                                                        • Instruction ID: cd37a06848945f9569646f388a4ab885e719e54391a802b91eb3650ba7b810d6
                                                        • Opcode Fuzzy Hash: 8192be1b5c038c594b461f27f246c970943d88fef77fefb47cb2d5b518b9aef2
                                                        • Instruction Fuzzy Hash: 87214772D003098FDB10DFAAC4857EEBBF4EF48210F54842AE519A7241CB78A944CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0973E766
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: a346a86dd56ac9f7c078bb29d2a1b9c3f4221c814ddc9722ebe4733d731aee1e
                                                        • Instruction ID: b97a1a3728fd95b301919ccb70435ca6bea887924429cf409f452f155850ca3a
                                                        • Opcode Fuzzy Hash: a346a86dd56ac9f7c078bb29d2a1b9c3f4221c814ddc9722ebe4733d731aee1e
                                                        • Instruction Fuzzy Hash: 7B1156728003489FDB10DFAAC844BDFBBF5EF88314F10881AE529A7250C776A940CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B4B4A1,00000800,00000000,00000000), ref: 02B4B6B2
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: a76c9f55aae1c18f44628f25d479dc0a0050c6f127f49b146a067a6365ac8602
                                                        • Instruction ID: 652da8696d278e1df7b1c6f5c4d099287fb7639b71bc78d1207c7cc364f541c5
                                                        • Opcode Fuzzy Hash: a76c9f55aae1c18f44628f25d479dc0a0050c6f127f49b146a067a6365ac8602
                                                        • Instruction Fuzzy Hash: B01103B6D002488FDB20CFAAC484ADEFBF4EB48314F10846AE519A7240C775A545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B4B4A1,00000800,00000000,00000000), ref: 02B4B6B2
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: d10dc0d6b88bb6fe750e7f8b9757fdc78e69a58a282b98649ac14013873687c6
                                                        • Instruction ID: cb333b62e26282481ff6b4b7c50be5e11ba365cf5ffdc0e90e1e9a0f2bdaf8aa
                                                        • Opcode Fuzzy Hash: d10dc0d6b88bb6fe750e7f8b9757fdc78e69a58a282b98649ac14013873687c6
                                                        • Instruction Fuzzy Hash: 6F1114B6D002489FDB10CFAAC484ADEFBF4EB58314F14841AD519A7340C775A545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0973E766
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 3af99df2d9f89e1c9e7312f93612d1b5f0a03eb7604a5d5489c31aa3d535230b
                                                        • Instruction ID: b46927500b9cef3e29701d0802ea106fc845a673c1887dee28b6ef1846bfc832
                                                        • Opcode Fuzzy Hash: 3af99df2d9f89e1c9e7312f93612d1b5f0a03eb7604a5d5489c31aa3d535230b
                                                        • Instruction Fuzzy Hash: 8F1149729003499FDB10DFAAC844BDFBBF5EF88310F14841AE529A7250C775A540CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: d7d0e91ea43d75498390ff40745be87b981e1f35beb73dc27402af730ba15255
                                                        • Instruction ID: 3669b18074f6e8322f18e73d147edbc266fe1255ced2d24ad0c498fd43f9b438
                                                        • Opcode Fuzzy Hash: d7d0e91ea43d75498390ff40745be87b981e1f35beb73dc27402af730ba15255
                                                        • Instruction Fuzzy Hash: CF1128719003488FDB24DFAAC8457DFFBF4AF88214F24841AD519A7650CB79A544CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1453731609.0000000009730000.00000040.00000800.00020000.00000000.sdmp, Offset: 09730000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9730000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: d2781e69bfa0446d2eed829a73afcb59dee98dbdaf0a0fed8571438e56356ee0
                                                        • Instruction ID: 5d489abf5415ef0afa9809e00edae061dbab92b19ca40ab0875d405b1d8966c7
                                                        • Opcode Fuzzy Hash: d2781e69bfa0446d2eed829a73afcb59dee98dbdaf0a0fed8571438e56356ee0
                                                        • Instruction Fuzzy Hash: 8E113A719003488FDB20DFAAC4457DFFBF4AF88214F14841AD519A7640CB79A544CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 02B4B426
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1446614033.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_2b40000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 624952718ce2202e4281def532f735d481f1e9a600bd087ca739bf904f229610
                                                        • Instruction ID: b9d1ec840e0040da0a72ab762c1596beebacefd3ecb0beaeaf57076942b63f41
                                                        • Opcode Fuzzy Hash: 624952718ce2202e4281def532f735d481f1e9a600bd087ca739bf904f229610
                                                        • Instruction Fuzzy Hash: CD110FB6D002498FCB20CF9AD484ADEFBF4EF88324F14845AD528A7640C779A545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 098526CD
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1454045633.0000000009850000.00000040.00000800.00020000.00000000.sdmp, Offset: 09850000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9850000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 584b7f511f08eddea6961f9e1347bdac11552439ec9ab4ac93d37a7975a22c04
                                                        • Instruction ID: 072dcbf19083f7ad03614e944af486c420b8293aeccc360cfdaed001bcc9df0b
                                                        • Opcode Fuzzy Hash: 584b7f511f08eddea6961f9e1347bdac11552439ec9ab4ac93d37a7975a22c04
                                                        • Instruction Fuzzy Hash: FB11D3B58003499FDB10DF9AD885BDEBFF8EB48314F20841AE929A7750C375A544CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 098526CD
                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1454045633.0000000009850000.00000040.00000800.00020000.00000000.sdmp, Offset: 09850000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_9850000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: a256ccf83d40451dbf4d8d8a7d9c3162ccef1028261d3a3c9b5c5f94351d7017
                                                        • Instruction ID: 8f87566507ccfec69cbef8ad756a55d94f23f2b115c0973a6f244bc76c32e919
                                                        • Opcode Fuzzy Hash: a256ccf83d40451dbf4d8d8a7d9c3162ccef1028261d3a3c9b5c5f94351d7017
                                                        • Instruction Fuzzy Hash: 2211E5B58003499FDB10DF9AD885BDEFBF8EB48310F10841AE929A7750C375A544CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1445214990.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_f9d000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e47264c1d37800b4a084f49b3e33f1a98575ddc264559e1c8606142de40587d
                                                        • Instruction ID: c998fa2fe4d4606a8effa9a2ddf69c0841debc7f4866789fb568d887a3c6079d
                                                        • Opcode Fuzzy Hash: 0e47264c1d37800b4a084f49b3e33f1a98575ddc264559e1c8606142de40587d
                                                        • Instruction Fuzzy Hash: 4221D672904244DFEF15DF14D9C0B26BBA5FB84328F34C569E9050B256C336D856DBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1445297128.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_fad000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 60451dee6d4bdfd1a35b7e3eea82c0b728fa3bc323ed1dcae517095091a634b2
                                                        • Instruction ID: 4020c25b5cb7b617e538168c73094cb891cd415be8d748378ab65e9be05f1966
                                                        • Opcode Fuzzy Hash: 60451dee6d4bdfd1a35b7e3eea82c0b728fa3bc323ed1dcae517095091a634b2
                                                        • Instruction Fuzzy Hash: 2C2107B5504340DFDB14DF20D9C4B16BBA5FB85324F20C56DE84B4B65AC336D847DA62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1445297128.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_fad000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a60d1953fc958c83dc4c98f0cd8cea5047e38f9cc4d92a587426c5553833212
                                                        • Instruction ID: 5dfae165fb9ece7191379e9c952d0f896e6cdcfe2a9f39fe810c858de622cdee
                                                        • Opcode Fuzzy Hash: 7a60d1953fc958c83dc4c98f0cd8cea5047e38f9cc4d92a587426c5553833212
                                                        • Instruction Fuzzy Hash: 062162755093C08FCB12CF24D994715BF71EB46314F28C5EAD8498F6A7C33A984ADB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 0000000C.00000002.1445214990.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_12_2_f9d000_emaGqYHYeYNHas.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                        • Instruction ID: c3248f8bac49a0265840af610b604f2fe8c75991771021b16552ac18339977aa
                                                        • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                                                        • Instruction Fuzzy Hash: FA119D76904280CFDF15CF10D5C4B16BF61FB94328F2886A9D8494B656C336D85ADBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:12%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:95
                                                        Total number of Limit Nodes:10
                                                        execution_graph 39245 27170b0 39246 27170f4 CheckRemoteDebuggerPresent 39245->39246 39247 2717136 39246->39247 39248 61d36d8 DuplicateHandle 39249 61d376e 39248->39249 39264 2710848 39266 271084e 39264->39266 39265 271091b 39266->39265 39271 27114b0 39266->39271 39276 271137f 39266->39276 39281 61d2378 39266->39281 39285 61d2388 39266->39285 39273 2711396 39271->39273 39272 27114a6 39272->39266 39273->39272 39275 27114b0 2 API calls 39273->39275 39289 2718278 39273->39289 39275->39273 39277 27112b3 39276->39277 39280 2711383 39276->39280 39277->39266 39278 27114b0 2 API calls 39278->39280 39279 2718278 2 API calls 39279->39280 39280->39277 39280->39278 39280->39279 39282 61d2388 39281->39282 39306 61d1a54 39282->39306 39286 61d2397 39285->39286 39287 61d1a54 2 API calls 39286->39287 39288 61d23b8 39287->39288 39288->39266 39290 2718282 39289->39290 39291 271829c 39290->39291 39294 61ff63b 39290->39294 39300 61ff648 39290->39300 39291->39273 39296 61ff65d 39294->39296 39295 61ff872 39295->39291 39296->39295 39297 61ffca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 39296->39297 39298 61ffee3 GlobalMemoryStatusEx GlobalMemoryStatusEx 39296->39298 39299 61ffc90 GlobalMemoryStatusEx GlobalMemoryStatusEx 39296->39299 39297->39296 39298->39296 39299->39296 39302 61ff65d 39300->39302 39301 61ff872 39301->39291 39302->39301 39303 61ffc90 GlobalMemoryStatusEx GlobalMemoryStatusEx 39302->39303 39304 61ffca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 39302->39304 39305 61ffee3 GlobalMemoryStatusEx GlobalMemoryStatusEx 39302->39305 39303->39302 39304->39302 39305->39302 39307 61d1a5f 39306->39307 39310 61d322c 39307->39310 39309 61d3d3e 39309->39309 39311 61d3237 39310->39311 39312 61d4464 39311->39312 39314 61d5ce8 39311->39314 39312->39309 39315 61d5d09 39314->39315 39316 61d5d2d 39315->39316 39318 61d62a0 39315->39318 39316->39312 39319 61d62ad 39318->39319 39320 61d62e6 39319->39320 39322 61d5e8c 39319->39322 39320->39316 39323 61d5e97 39322->39323 39325 61d6358 39323->39325 39326 61d5ec0 39323->39326 39325->39325 39327 61d5ecb 39326->39327 39333 61d5ed0 39327->39333 39329 61d63c7 39337 61db700 39329->39337 39342 61db6e8 39329->39342 39330 61d6401 39330->39325 39336 61d5edb 39333->39336 39334 61d7650 39334->39329 39335 61d5ce8 2 API calls 39335->39334 39336->39334 39336->39335 39338 61db702 39337->39338 39339 61db73d 39338->39339 39347 61db978 39338->39347 39350 61db968 39338->39350 39339->39330 39343 61db6f8 39342->39343 39344 61db73d 39343->39344 39345 61db978 2 API calls 39343->39345 39346 61db968 2 API calls 39343->39346 39344->39330 39345->39344 39346->39344 39354 61db9b8 39347->39354 39348 61db982 39348->39339 39351 61db974 39350->39351 39353 61db9b8 2 API calls 39351->39353 39352 61db982 39352->39339 39353->39352 39355 61db9bd 39354->39355 39356 61db9fc 39355->39356 39360 61dbc60 LoadLibraryExW 39355->39360 39361 61dbc53 LoadLibraryExW 39355->39361 39356->39348 39357 61db9f4 39357->39356 39358 61dbc00 GetModuleHandleW 39357->39358 39359 61dbc2d 39358->39359 39359->39348 39360->39357 39361->39357 39250 61d3490 39251 61d34d6 GetCurrentProcess 39250->39251 39253 61d3528 GetCurrentThread 39251->39253 39254 61d3521 39251->39254 39255 61d355e 39253->39255 39256 61d3565 GetCurrentProcess 39253->39256 39254->39253 39255->39256 39257 61d359b 39256->39257 39258 61d35c3 GetCurrentThreadId 39257->39258 39259 61d35f4 39258->39259 39260 61ddbb0 39261 61ddc18 CreateWindowExW 39260->39261 39263 61ddcd4 39261->39263

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1262 61f51b0-61f51cd 1263 61f51cf-61f51d2 1262->1263 1264 61f51ee-61f51f1 1263->1264 1265 61f51d4-61f51e9 1263->1265 1266 61f51ff-61f5202 1264->1266 1267 61f51f3-61f51fa 1264->1267 1265->1264 1269 61f520c-61f520f 1266->1269 1270 61f5204-61f5207 1266->1270 1267->1266 1271 61f522c-61f522f 1269->1271 1272 61f5211-61f5227 1269->1272 1270->1269 1273 61f5245-61f5248 1271->1273 1274 61f5231-61f5240 1271->1274 1272->1271 1275 61f524f-61f5252 1273->1275 1276 61f524a-61f524c 1273->1276 1274->1273 1279 61f5276-61f5279 1275->1279 1280 61f5254-61f5271 1275->1280 1276->1275 1281 61f527b-61f5281 1279->1281 1282 61f5288-61f528b 1279->1282 1280->1279 1283 61f528d-61f5297 1281->1283 1286 61f5283 1281->1286 1282->1283 1284 61f52a5-61f52a8 1282->1284 1289 61f529e-61f52a0 1283->1289 1287 61f52bb-61f52be 1284->1287 1288 61f52aa-61f52b0 1284->1288 1286->1282 1292 61f52cd-61f52d0 1287->1292 1293 61f52c0-61f52c6 1287->1293 1290 61f52b6 1288->1290 1291 61f5350-61f5353 1288->1291 1289->1284 1290->1287 1299 61f5358-61f535a 1291->1299 1297 61f52e4-61f52e7 1292->1297 1298 61f52d2-61f52df 1292->1298 1295 61f52fe-61f5304 1293->1295 1296 61f52c8 1293->1296 1300 61f5378-61f53a3 1295->1300 1301 61f5306-61f530e 1295->1301 1296->1292 1297->1293 1302 61f52e9-61f52ec 1297->1302 1298->1297 1303 61f535c 1299->1303 1304 61f5361-61f5364 1299->1304 1315 61f53ad-61f53b0 1300->1315 1301->1300 1306 61f5310-61f531d 1301->1306 1308 61f52ee-61f52f2 1302->1308 1309 61f52f9-61f52fc 1302->1309 1303->1304 1304->1263 1305 61f536a-61f5377 1304->1305 1306->1300 1313 61f531f-61f5323 1306->1313 1308->1305 1310 61f52f4 1308->1310 1309->1295 1311 61f5328-61f532b 1309->1311 1310->1309 1311->1281 1314 61f5331-61f5334 1311->1314 1313->1311 1316 61f533c-61f533f 1314->1316 1317 61f5336-61f5337 1314->1317 1318 61f53c8-61f53cb 1315->1318 1319 61f53b2-61f53c3 1315->1319 1320 61f534b-61f534e 1316->1320 1321 61f5341-61f534a 1316->1321 1317->1316 1322 61f53cd-61f53d7 1318->1322 1323 61f53dc-61f53df 1318->1323 1319->1318 1320->1291 1320->1299 1322->1323 1325 61f5401-61f5404 1323->1325 1326 61f53e1-61f53e5 1323->1326 1327 61f5426-61f5429 1325->1327 1328 61f5406-61f540a 1325->1328 1330 61f53eb-61f53f3 1326->1330 1331 61f549a-61f54d4 1326->1331 1334 61f542b-61f5432 1327->1334 1335 61f5433-61f5436 1327->1335 1328->1331 1333 61f5410-61f5418 1328->1333 1330->1331 1332 61f53f9-61f53fc 1330->1332 1352 61f54d6-61f54d9 1331->1352 1332->1325 1333->1331 1336 61f541e-61f5421 1333->1336 1337 61f5438-61f543c 1335->1337 1338 61f5450-61f5453 1335->1338 1336->1327 1337->1331 1340 61f543e-61f5446 1337->1340 1341 61f5455-61f545c 1338->1341 1342 61f5463-61f5466 1338->1342 1340->1331 1343 61f5448-61f544b 1340->1343 1345 61f545e 1341->1345 1346 61f5492-61f5499 1341->1346 1347 61f5468-61f546c 1342->1347 1348 61f5480-61f5482 1342->1348 1343->1338 1345->1342 1347->1331 1349 61f546e-61f5476 1347->1349 1350 61f5489-61f548c 1348->1350 1351 61f5484 1348->1351 1349->1331 1353 61f5478-61f547b 1349->1353 1350->1315 1350->1346 1351->1350 1354 61f54db-61f54ec 1352->1354 1355 61f54f3-61f54f6 1352->1355 1353->1348 1362 61f551e-61f5525 1354->1362 1364 61f54ee 1354->1364 1356 61f54f8-61f5509 1355->1356 1357 61f5514-61f5517 1355->1357 1365 61f550f 1356->1365 1366 61f5863-61f5876 1356->1366 1358 61f5519-61f551c 1357->1358 1359 61f5572-61f5706 1357->1359 1358->1362 1363 61f552a-61f552d 1358->1363 1412 61f583f-61f5852 1359->1412 1413 61f570c-61f5713 1359->1413 1362->1363 1368 61f552f-61f5534 1363->1368 1369 61f5537-61f553a 1363->1369 1364->1355 1365->1357 1368->1369 1370 61f553c-61f5543 1369->1370 1371 61f5548-61f554b 1369->1371 1370->1371 1374 61f554d-61f555e 1371->1374 1375 61f5569-61f556c 1371->1375 1374->1354 1381 61f5564 1374->1381 1375->1359 1376 61f5855-61f5858 1375->1376 1376->1359 1378 61f585e-61f5861 1376->1378 1378->1366 1380 61f5879-61f587c 1378->1380 1382 61f587e-61f588f 1380->1382 1383 61f589a-61f589d 1380->1383 1381->1375 1382->1362 1392 61f5895 1382->1392 1385 61f589f-61f58b0 1383->1385 1386 61f58bb-61f58bd 1383->1386 1385->1362 1394 61f58b6 1385->1394 1389 61f58bf 1386->1389 1390 61f58c4-61f58c7 1386->1390 1389->1390 1390->1352 1391 61f58cd-61f58d6 1390->1391 1392->1383 1394->1386 1414 61f5719-61f573c 1413->1414 1415 61f57c7-61f57ce 1413->1415 1424 61f5744-61f574c 1414->1424 1415->1412 1417 61f57d0-61f5803 1415->1417 1428 61f5808-61f5835 1417->1428 1429 61f5805 1417->1429 1426 61f574e 1424->1426 1427 61f5751-61f5792 1424->1427 1426->1427 1437 61f57aa-61f57bb 1427->1437 1438 61f5794-61f57a5 1427->1438 1428->1391 1428->1412 1429->1428 1437->1391 1438->1391
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-3993045852
                                                        • Opcode ID: 424839ae65109443f00833ac82a307f8189b7f3d97b94f981e47873bb1f3d5a3
                                                        • Instruction ID: 0d5042a052575b5dc50661c27d13ff3d28a2e2c6c219c79444b850f991c00452
                                                        • Opcode Fuzzy Hash: 424839ae65109443f00833ac82a307f8189b7f3d97b94f981e47873bb1f3d5a3
                                                        • Instruction Fuzzy Hash: CB22BE31E202158FDF64DBA4C4806AEBBB3FF95320F258569D519AB354DB35EC42CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f2c4a0bdd5dabb2edbeebb7b8d3e1c4a504ffdf82bb6ee776f84c2828562163a
                                                        • Instruction ID: 2fee2cfd61558212a4e04f4e7bcb469a7cb1e8426dae71070d40926e08d6c8e5
                                                        • Opcode Fuzzy Hash: f2c4a0bdd5dabb2edbeebb7b8d3e1c4a504ffdf82bb6ee776f84c2828562163a
                                                        • Instruction Fuzzy Hash: 66D26830E10205CFDB64DBA8C584A9DB7F2FF89310F55C5AAD509AB261EB31ED85CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0702863b007d90c105c9ea6666daebc0b7d532c1e649f12023bafc6685815e3d
                                                        • Instruction ID: f33d88459e8d14be259ceff1d25b08df45b9b8afe8fe267d1c0aca2207257288
                                                        • Opcode Fuzzy Hash: 0702863b007d90c105c9ea6666daebc0b7d532c1e649f12023bafc6685815e3d
                                                        • Instruction Fuzzy Hash: F462AC30B20205DFDB54DB68D594AADB7F2EF89310F248569E506EB394DB35EC46CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24e3ec51f5ee92f469851d6f46f19fb86a58759c17d199ddf68619b44e7248e5
                                                        • Instruction ID: ce557112496997511f67326b94b4a6de9871511d848f295031e6779a84794290
                                                        • Opcode Fuzzy Hash: 24e3ec51f5ee92f469851d6f46f19fb86a58759c17d199ddf68619b44e7248e5
                                                        • Instruction Fuzzy Hash: ED529230E242098FEF64DB68D4907AEB7B2FB85310F25852AE506EB395DB35DC41CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b3309da66ad2fd994c86e5d7556765947abb3729ebf6eee23d02095fa2b5219f
                                                        • Instruction ID: fd903cec65ba69d4197cc79993c0a6b596f2d42190cb295801c9456884d54d20
                                                        • Opcode Fuzzy Hash: b3309da66ad2fd994c86e5d7556765947abb3729ebf6eee23d02095fa2b5219f
                                                        • Instruction Fuzzy Hash: 3B327E34B202099FDF54DB68D890BAEB7B2FB89310F108565E605EB395DB35EC42DB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ffb3221f2eeedd68b3a58418c6762c13edaec6968ebbc7428a9cd1dbc840b9ba
                                                        • Instruction ID: 52c9013c320623052a62c70835b3b0f69ee34f8811900c68c9988a89c8582378
                                                        • Opcode Fuzzy Hash: ffb3221f2eeedd68b3a58418c6762c13edaec6968ebbc7428a9cd1dbc840b9ba
                                                        • Instruction Fuzzy Hash: C402BC30B20205CFDB98DB68D894AAEB7F2BF84310F558929D515EB394DB71EC42CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 061D350E
                                                        • GetCurrentThread.KERNEL32 ref: 061D354B
                                                        • GetCurrentProcess.KERNEL32 ref: 061D3588
                                                        • GetCurrentThreadId.KERNEL32 ref: 061D35E1
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 8726bc797bcbecbb70cf2e423b9121357272928be85a4aaf49fe681ad86a57f9
                                                        • Instruction ID: 0922d0792fe39c3b9e3317ac9d4d561f6be11164ed997e25b66677b0c93c0ebd
                                                        • Opcode Fuzzy Hash: 8726bc797bcbecbb70cf2e423b9121357272928be85a4aaf49fe681ad86a57f9
                                                        • Instruction Fuzzy Hash: BE5155B0D007498FDB54CFAADA4879EBBF1AF48314F248459E019A7350D774A984CB66
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 061D350E
                                                        • GetCurrentThread.KERNEL32 ref: 061D354B
                                                        • GetCurrentProcess.KERNEL32 ref: 061D3588
                                                        • GetCurrentThreadId.KERNEL32 ref: 061D35E1
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 0ee3fc139e5733c0615b52f50789887409ca7c5acb146dffbd8cc3d83f368b9d
                                                        • Instruction ID: 57668bc235513509f4e5a7f8c7f06efaddaa22ecc1c79c0815f3ed11faeea216
                                                        • Opcode Fuzzy Hash: 0ee3fc139e5733c0615b52f50789887409ca7c5acb146dffbd8cc3d83f368b9d
                                                        • Instruction Fuzzy Hash: AA5165B0D007498FDB54CFAADA48B9EBBF1AF48314F248459E019A7350D774A984CF66
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1441 61db9b8-61db9d7 1443 61db9d9-61db9e6 call 61da968 1441->1443 1444 61dba03-61dba07 1441->1444 1451 61db9fc 1443->1451 1452 61db9e8 1443->1452 1445 61dba09-61dba13 1444->1445 1446 61dba1b-61dba5c 1444->1446 1445->1446 1453 61dba5e-61dba66 1446->1453 1454 61dba69-61dba77 1446->1454 1451->1444 1500 61db9ee call 61dbc60 1452->1500 1501 61db9ee call 61dbc53 1452->1501 1453->1454 1455 61dba79-61dba7e 1454->1455 1456 61dba9b-61dba9d 1454->1456 1459 61dba89 1455->1459 1460 61dba80-61dba87 call 61da974 1455->1460 1458 61dbaa0-61dbaa7 1456->1458 1457 61db9f4-61db9f6 1457->1451 1461 61dbb38-61dbbf8 1457->1461 1462 61dbaa9-61dbab1 1458->1462 1463 61dbab4-61dbabb 1458->1463 1465 61dba8b-61dba99 1459->1465 1460->1465 1493 61dbbfa-61dbbfd 1461->1493 1494 61dbc00-61dbc2b GetModuleHandleW 1461->1494 1462->1463 1466 61dbabd-61dbac5 1463->1466 1467 61dbac8-61dbad1 call 61d3f9c 1463->1467 1465->1458 1466->1467 1473 61dbade-61dbae3 1467->1473 1474 61dbad3-61dbadb 1467->1474 1475 61dbae5-61dbaec 1473->1475 1476 61dbb01-61dbb05 1473->1476 1474->1473 1475->1476 1478 61dbaee-61dbafe call 61d9188 call 61da984 1475->1478 1498 61dbb08 call 61dbf10 1476->1498 1499 61dbb08 call 61dbf20 1476->1499 1478->1476 1479 61dbb0b-61dbb0e 1482 61dbb31-61dbb37 1479->1482 1483 61dbb10-61dbb2e 1479->1483 1483->1482 1493->1494 1495 61dbc2d-61dbc33 1494->1495 1496 61dbc34-61dbc48 1494->1496 1495->1496 1498->1479 1499->1479 1500->1457 1501->1457
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 061DBC1E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 6051f5542a235cda8e3b2470eb2f5f94095afaa3f625ec5c3928a7ea74b80b78
                                                        • Instruction ID: 12f27e0270b4b1eb953728eddb6e85cd6d7837182ae6932014b66393450affde
                                                        • Opcode Fuzzy Hash: 6051f5542a235cda8e3b2470eb2f5f94095afaa3f625ec5c3928a7ea74b80b78
                                                        • Instruction Fuzzy Hash: 928157B0A00B059FD764DF2AD44079ABBF1FF88300F048A2DD49ADBA50DB75E846CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1502 61ddba4-61ddba6 1503 61ddbae-61ddc16 1502->1503 1504 61ddba8-61ddbac 1502->1504 1506 61ddc18-61ddc1e 1503->1506 1507 61ddc21-61ddc28 1503->1507 1504->1503 1506->1507 1508 61ddc2a-61ddc30 1507->1508 1509 61ddc33-61ddc6b 1507->1509 1508->1509 1510 61ddc73-61ddcd2 CreateWindowExW 1509->1510 1511 61ddcdb-61ddd13 1510->1511 1512 61ddcd4-61ddcda 1510->1512 1516 61ddd15-61ddd18 1511->1516 1517 61ddd20 1511->1517 1512->1511 1516->1517 1518 61ddd21 1517->1518 1518->1518
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061DDCC2
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: f88701fe551ac9e324b461f19144c5332f5a7971a2bc099cf3fb78794e26dc8f
                                                        • Instruction ID: b84e1a384b7d264cf6938dff01cf144630332be759501279b7dbb5d3b82bbe18
                                                        • Opcode Fuzzy Hash: f88701fe551ac9e324b461f19144c5332f5a7971a2bc099cf3fb78794e26dc8f
                                                        • Instruction Fuzzy Hash: C251D3B1D0034D9FDF14CFA9D884ADEBBB5BF48310F64852AE819AB250D7759845CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1519 61ddbb0-61ddc16 1520 61ddc18-61ddc1e 1519->1520 1521 61ddc21-61ddc28 1519->1521 1520->1521 1522 61ddc2a-61ddc30 1521->1522 1523 61ddc33-61ddcd2 CreateWindowExW 1521->1523 1522->1523 1525 61ddcdb-61ddd13 1523->1525 1526 61ddcd4-61ddcda 1523->1526 1530 61ddd15-61ddd18 1525->1530 1531 61ddd20 1525->1531 1526->1525 1530->1531 1532 61ddd21 1531->1532 1532->1532
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061DDCC2
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 1a20d3884c1b414dc2947a98f37492f68e15a18abcafdb10de1337b30ab95cb1
                                                        • Instruction ID: 31c22436ed32e866377d12b39f793dd87323cd54df777e2884dc01ccec133612
                                                        • Opcode Fuzzy Hash: 1a20d3884c1b414dc2947a98f37492f68e15a18abcafdb10de1337b30ab95cb1
                                                        • Instruction Fuzzy Hash: 8441B1B1D003499FDF14CFAAD884ADEBBB5BF48310F24852AE819AB250D7759845CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1533 27170a9-2717134 CheckRemoteDebuggerPresent 1535 2717136-271713c 1533->1535 1536 271713d-2717178 1533->1536 1535->1536
                                                        APIs
                                                        • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02717127
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2609346689.0000000002710000.00000040.00000800.00020000.00000000.sdmp, Offset: 02710000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2710000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CheckDebuggerPresentRemote
                                                        • String ID:
                                                        • API String ID: 3662101638-0
                                                        • Opcode ID: 9fe0681b17cf322ca6b2441281bf191fdb4808c7d780c8e01ed1cc703d91a0b4
                                                        • Instruction ID: 2019222fdd3441a1b833f78cbe4d02a4c392d4cc583ef722577390a28eebc804
                                                        • Opcode Fuzzy Hash: 9fe0681b17cf322ca6b2441281bf191fdb4808c7d780c8e01ed1cc703d91a0b4
                                                        • Instruction Fuzzy Hash: 462148B2901259CFDB14CF9AD884BEEFBF4AF48310F24845AE458A7250C7789944CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1539 27170b0-2717134 CheckRemoteDebuggerPresent 1541 2717136-271713c 1539->1541 1542 271713d-2717178 1539->1542 1541->1542
                                                        APIs
                                                        • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02717127
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2609346689.0000000002710000.00000040.00000800.00020000.00000000.sdmp, Offset: 02710000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2710000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: CheckDebuggerPresentRemote
                                                        • String ID:
                                                        • API String ID: 3662101638-0
                                                        • Opcode ID: 4f052c1a655cd30c925e68c2147695813b3e16585fd491748b6a680909478673
                                                        • Instruction ID: f60076f6be42ddb0a6702cd9b349cb85d301f0fa1f30f1d613a2d9facb47dbdd
                                                        • Opcode Fuzzy Hash: 4f052c1a655cd30c925e68c2147695813b3e16585fd491748b6a680909478673
                                                        • Instruction Fuzzy Hash: 1E2139B2801259CFDB14CF9AD884BEEFBF4AF48210F14845AE455A3250D778A944CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1545 61d36d0-61d376c DuplicateHandle 1546 61d376e-61d3774 1545->1546 1547 61d3775-61d3792 1545->1547 1546->1547
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061D375F
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 7ae42bb3029752699ca0de6069cb14ee5fb20a944984c5a49334e21522c59607
                                                        • Instruction ID: cbdb0269d43c5a484765f6060e20374d337e0e701a27a6b8624d5c5f5d1b5443
                                                        • Opcode Fuzzy Hash: 7ae42bb3029752699ca0de6069cb14ee5fb20a944984c5a49334e21522c59607
                                                        • Instruction Fuzzy Hash: E421C4B5D00248EFDB10CFAAD984ADEBBF5EB48310F24841AE914A7350D374A955CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1550 61d36d8-61d376c DuplicateHandle 1551 61d376e-61d3774 1550->1551 1552 61d3775-61d3792 1550->1552 1551->1552
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061D375F
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 78d6ab27fbf2cc58355487551428b3d78b8203e3765ea1d90ec1e3952fc2f2e0
                                                        • Instruction ID: 4dbbdb94fcbaeedd962a093ea053965449286a48121b194fc20a0224f08a3eb1
                                                        • Opcode Fuzzy Hash: 78d6ab27fbf2cc58355487551428b3d78b8203e3765ea1d90ec1e3952fc2f2e0
                                                        • Instruction Fuzzy Hash: 2F21C4B5D00248AFDB10CFAAD984ADEBBF9EB48310F14841AE914A3350D374A945CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1555 271f0b7-271f144 GlobalMemoryStatusEx 1558 271f146-271f14c 1555->1558 1559 271f14d-271f175 1555->1559 1558->1559
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0271F137
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2609346689.0000000002710000.00000040.00000800.00020000.00000000.sdmp, Offset: 02710000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2710000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: ae63ab732534e746a057a0b13a73491655e0bd7ef3f2f4dac116c4890f6871be
                                                        • Instruction ID: ab81f2f27c4169da5c51a160c38a2eaebe95f1040fb0a0af911f99aa9ca01919
                                                        • Opcode Fuzzy Hash: ae63ab732534e746a057a0b13a73491655e0bd7ef3f2f4dac116c4890f6871be
                                                        • Instruction Fuzzy Hash: 151153B2C00659CFCB10CFAAC4447DEFBF4AF08210F10816AD828B7641D338A905CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1562 61dbe1b-61dbe60 1564 61dbe68-61dbe97 LoadLibraryExW 1562->1564 1565 61dbe62-61dbe65 1562->1565 1566 61dbe99-61dbe9f 1564->1566 1567 61dbea0-61dbebd 1564->1567 1565->1564 1566->1567
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,061DBC99,00000800,00000000,00000000), ref: 061DBE8A
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: cacb97eec50c0b7c148e2376dd8c6d0f8f40e0d0410f22a9e47196b394feea25
                                                        • Instruction ID: 237fbc68c748b9741bda9d9b1edc3c17080a6226a28dc5a86d9c4939ca6ffee5
                                                        • Opcode Fuzzy Hash: cacb97eec50c0b7c148e2376dd8c6d0f8f40e0d0410f22a9e47196b394feea25
                                                        • Instruction Fuzzy Hash: 131126B6C003089FDB10CFAAC844BDEFBF8EB88310F11841AE519A7210C775A545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1570 61da9b0-61dbe60 1572 61dbe68-61dbe97 LoadLibraryExW 1570->1572 1573 61dbe62-61dbe65 1570->1573 1574 61dbe99-61dbe9f 1572->1574 1575 61dbea0-61dbebd 1572->1575 1573->1572 1574->1575
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,061DBC99,00000800,00000000,00000000), ref: 061DBE8A
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 7deb785106631ce2b21e79527fdf1e1620ce12efc25577dcf705f5531478e02c
                                                        • Instruction ID: f3cb3710384e81da9950b829cdb75f274306dd5f119a1a9f4993b0adb11d8151
                                                        • Opcode Fuzzy Hash: 7deb785106631ce2b21e79527fdf1e1620ce12efc25577dcf705f5531478e02c
                                                        • Instruction Fuzzy Hash: 211103B6C043088FDB14CF9AC444B9EFBF9EB88610F11846AE519A7250C375A545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1578 271f0d0-271f144 GlobalMemoryStatusEx 1580 271f146-271f14c 1578->1580 1581 271f14d-271f175 1578->1581 1580->1581
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0271F137
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2609346689.0000000002710000.00000040.00000800.00020000.00000000.sdmp, Offset: 02710000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2710000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: 41d8168327415981c0d44bdc8c395f451adb3bdf57cfc714a6bdae6289750a9e
                                                        • Instruction ID: 4333282dfb501bdb540a6c4206e3de0c00c45c12bfd5ba00afa81e9a15b80f4a
                                                        • Opcode Fuzzy Hash: 41d8168327415981c0d44bdc8c395f451adb3bdf57cfc714a6bdae6289750a9e
                                                        • Instruction Fuzzy Hash: ED1126B1C006599BDB10CFAAC444BDEFBF4AF48220F11812AE818A7640D378A941CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1584 61dbbb8-61dbbf8 1585 61dbbfa-61dbbfd 1584->1585 1586 61dbc00-61dbc2b GetModuleHandleW 1584->1586 1585->1586 1587 61dbc2d-61dbc33 1586->1587 1588 61dbc34-61dbc48 1586->1588 1587->1588
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 061DBC1E
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617656148.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: e5c6abeea1d5b18765537766ecedec49a1e817a65dd1d0c6b9f567115d2d7b5d
                                                        • Instruction ID: 58d8a8a6e09c19cabef921d9e485d2c2bfd9da3acc8b8066227c60cf5c9ed95a
                                                        • Opcode Fuzzy Hash: e5c6abeea1d5b18765537766ecedec49a1e817a65dd1d0c6b9f567115d2d7b5d
                                                        • Instruction Fuzzy Hash: 6C1110B6C002498FCB20CF9AC844BDEFBF4AF88214F11841AD829A7210C379A545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: 8e56a0265e9647b8dfc1f44892c30c2f94e22576d72b0bbef6eb69a65061bb73
                                                        • Instruction ID: f1b53f6b3bcbcf941f5461cbc0888fefff965acffb1a47b8fd8c0710d6561756
                                                        • Opcode Fuzzy Hash: 8e56a0265e9647b8dfc1f44892c30c2f94e22576d72b0bbef6eb69a65061bb73
                                                        • Instruction Fuzzy Hash: 6C21E271F142508FCB91DF7898047ADBBF1AF89610F1544AEE64ADB3A2DB359C01CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: eb2f0409a53745e7833374226493c000df66152c23bcd06f256be91028d0f047
                                                        • Instruction ID: 6439998d7aeef9c472572d973825cda119f74f783fd2cb0217574fc064925274
                                                        • Opcode Fuzzy Hash: eb2f0409a53745e7833374226493c000df66152c23bcd06f256be91028d0f047
                                                        • Instruction Fuzzy Hash: F2115E71B102249FDB94DF789804B6E7BF1AF8C610F104469EA0AEB3A0DB759D01CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 164c25399dec55798588af6bc765baac3b8f75c760f95bb50276137bad251c78
                                                        • Instruction ID: b5632616c76ad4cd7dbf4f1c8dad9df1e1de3660add63a2a0a6414f69f64e7c9
                                                        • Opcode Fuzzy Hash: 164c25399dec55798588af6bc765baac3b8f75c760f95bb50276137bad251c78
                                                        • Instruction Fuzzy Hash: 6E626E30A1060ADFCF55EB68E590AADB3F2FF85714B208A68D1159F355EB71EC46CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9b83432b17b1ae035193e92d6187f1defbb62918abc648170e619a750fbc39d9
                                                        • Instruction ID: 5a7052cc97162b850e7a8da4c3c0a37ded6152f6e586d48ee9fc995332229d77
                                                        • Opcode Fuzzy Hash: 9b83432b17b1ae035193e92d6187f1defbb62918abc648170e619a750fbc39d9
                                                        • Instruction Fuzzy Hash: 44E17C30E20209DFDF69DB69D8806AEB7B2BFC5210F108529D919AB345DB75E842CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: db7cc5cfdc0ed03543146382f1f301d7096ebb068c1deea744c25511800caffc
                                                        • Instruction ID: a136d8d495798926333f56e72bb59e29937fe87d98eb10e96669030fe18b95f5
                                                        • Opcode Fuzzy Hash: db7cc5cfdc0ed03543146382f1f301d7096ebb068c1deea744c25511800caffc
                                                        • Instruction Fuzzy Hash: A1A1D830F242098BEF64DB6CD4907AEB7B2EB89310F604429E506EB395CB39DC418B55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c957d28e09630c849d21a939aa748ac062db5067e4d26d71d1faac39ebcd29b5
                                                        • Instruction ID: 1ba5d96381f5295c99095bd02318d521fdc7f42be1dc28e2fae06fd802d39747
                                                        • Opcode Fuzzy Hash: c957d28e09630c849d21a939aa748ac062db5067e4d26d71d1faac39ebcd29b5
                                                        • Instruction Fuzzy Hash: F7917F34B1060A9FDB94EB79D8547AE73F2AFC5300F118969D509EB384EB31AC42CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9631ef563e1dd7a904e9dd405e060f5d3fb069c2aad4a87ec0234dc745c5e1a7
                                                        • Instruction ID: 6b94cb7b224a0ce8a12b9c27148388969e1a6615d8d82b2370252af87f60eda0
                                                        • Opcode Fuzzy Hash: 9631ef563e1dd7a904e9dd405e060f5d3fb069c2aad4a87ec0234dc745c5e1a7
                                                        • Instruction Fuzzy Hash: 5A61E071F101114BDF50AB7ED9846AEBAE7AFD4620B254439D80ADB321DFB6EC0287D1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 267180d55160fd490d6623a2c934c33a497aadde686149ef77ba8e3f4ed117ea
                                                        • Instruction ID: 2d778e548c6b3f4d014222bc1d96d32a955928d25d5fe7f021f44f316a48513e
                                                        • Opcode Fuzzy Hash: 267180d55160fd490d6623a2c934c33a497aadde686149ef77ba8e3f4ed117ea
                                                        • Instruction Fuzzy Hash: 91815D30B1020A9BDF54DFB9C4547AEB7F2AF85300F108529E51AEB395DB75EC428B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e9174cc3982bc74dbe6b4d81c9c98ba66353523b9fe18e7fbaac1f505c315ff0
                                                        • Instruction ID: 848886572e71b2d07d318c511dba85c3c2643ac2122b849dcdd8fee725fd3e01
                                                        • Opcode Fuzzy Hash: e9174cc3982bc74dbe6b4d81c9c98ba66353523b9fe18e7fbaac1f505c315ff0
                                                        • Instruction Fuzzy Hash: 5C814D30B1020A9BDF54DFB9C4547AEB7F2AF85300F108529E51AEB395DB75EC428B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41c384e766e06af4d07a35a00061b55a12521ffaac807f9911d0b304fd0af3c1
                                                        • Instruction ID: 6b34f07ff026763a81c2114ead771f0e6d94155b45c87ddb3e5e4a1ec86c55f6
                                                        • Opcode Fuzzy Hash: 41c384e766e06af4d07a35a00061b55a12521ffaac807f9911d0b304fd0af3c1
                                                        • Instruction Fuzzy Hash: AB914F30E106198BDF50DF68C890B9EB7B1FF85310F208699D549BB351EB71A985CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b7abbac82aa447189d7a96cc4a3e05591979777a343ce4e11cfcad74f507c6c6
                                                        • Instruction ID: 6925672f812f1444ab9fd38f7c0176b8a4d60055a97c1cdd9bb7c6c592d4a487
                                                        • Opcode Fuzzy Hash: b7abbac82aa447189d7a96cc4a3e05591979777a343ce4e11cfcad74f507c6c6
                                                        • Instruction Fuzzy Hash: FA915030E102198BDF60DF68C880B9EB7B1FF89310F208599D549BB341EB71AA85CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ba64f1e761c1817509e85b51cfca2b75c6796015af024aca1b75bc435804e3c9
                                                        • Instruction ID: ae3c6f4dc5be74c9733ec21f2b18782a26151b67ea4fe2b394e1f2e8a0662d90
                                                        • Opcode Fuzzy Hash: ba64f1e761c1817509e85b51cfca2b75c6796015af024aca1b75bc435804e3c9
                                                        • Instruction Fuzzy Hash: 40715C30E10209AFDB54DFA8D980A9DBBF6BF84310F248569E519EB365DB30EC46CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1ce45dbe6190f694c63518a22760bbdaa85f866ea6690c1276e4219c8cf07ed4
                                                        • Instruction ID: 0085a4a503ff60631ae749ccd786e1c5723c191d2c79234a9e45b6d18d536a12
                                                        • Opcode Fuzzy Hash: 1ce45dbe6190f694c63518a22760bbdaa85f866ea6690c1276e4219c8cf07ed4
                                                        • Instruction Fuzzy Hash: 9A712A30A10209AFDB54DFA9D990A9DBBF6BF88310F148569E519EB364DB30EC46CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f1359706e2f2e3f9b15eba92d5cf40ae492dee3858d9dc3e305fda98955b9d1
                                                        • Instruction ID: 676577d61e52e138ab5dbd07ef1ea326677adde9e63864687a3c333347ff74c8
                                                        • Opcode Fuzzy Hash: 2f1359706e2f2e3f9b15eba92d5cf40ae492dee3858d9dc3e305fda98955b9d1
                                                        • Instruction Fuzzy Hash: 36617E30F102089FEF549BA5D854BAEBBF6FF88300F208529E506AB395DF758C458B94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eafb47cfdee108ad815056bc682e48cb228fb08e76361b90b10c4b4305bf01e9
                                                        • Instruction ID: 1de3ca4a0cda38f1855dc50c60294bbcedfed5663a2a7549399ead294edbf4c5
                                                        • Opcode Fuzzy Hash: eafb47cfdee108ad815056bc682e48cb228fb08e76361b90b10c4b4305bf01e9
                                                        • Instruction Fuzzy Hash: 8B51DF31E20209DFDF54EF79E4886ADB7B2FF84311F11886AE206D7251DB719856CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 966502327716d957ba7fb7626199de4360c32f2e65873c72c2ef861829a0d648
                                                        • Instruction ID: 0b95f4425f8cce43fba6a6aec8a3993482f0b4b5c7c5d3509f5702c8250da4b5
                                                        • Opcode Fuzzy Hash: 966502327716d957ba7fb7626199de4360c32f2e65873c72c2ef861829a0d648
                                                        • Instruction Fuzzy Hash: D9517330B101059FDB54EB78D854BAE73F6ABC5310F118869D509EB394EB31DC02CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f0b83461b9eb16e8d1d6a97185987772814bafb5866f9130062cbfe5f1d24268
                                                        • Instruction ID: a95a9ff3e8f77b302bb067a37b302968c424e08726f9b2a4850a687b6e8f2b7d
                                                        • Opcode Fuzzy Hash: f0b83461b9eb16e8d1d6a97185987772814bafb5866f9130062cbfe5f1d24268
                                                        • Instruction Fuzzy Hash: FA51D830F202158FEF64576CD8947AF765AD7CAB10F60452AE20ACB3E9DFA9CC424791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4749cd76f1abd57f325ffecada3a77bd163ff1b9ee13e72ad97b46021e919930
                                                        • Instruction ID: c07edae4e45bb574f9daffd8e07f4e034404e95d8fa79a7f4389cd1ac00105c8
                                                        • Opcode Fuzzy Hash: 4749cd76f1abd57f325ffecada3a77bd163ff1b9ee13e72ad97b46021e919930
                                                        • Instruction Fuzzy Hash: 2D51C730F202159FEF64676CD89476F725AD7CAB10F60452AE20ACB3E9DFA9CC424791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 112506181743e983b25817d2d14497ff560813f330f1dd29b993e71083637c6d
                                                        • Instruction ID: b6c4a5a65d3230495baed66c0ceb22fadb6124ce1452850f943bc72bd41e4d0f
                                                        • Opcode Fuzzy Hash: 112506181743e983b25817d2d14497ff560813f330f1dd29b993e71083637c6d
                                                        • Instruction Fuzzy Hash: DB519170E206058BDF61CBB8C4C0B6EFBB2FB55310F548A26E219DB285C775E841CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d7db186c0bbc01022ed7764f0a8fd0d2e7fc832f5a9c884cfef9bb067686a794
                                                        • Instruction ID: 2a108dc5e90ce4338355cb4458a8b8e4760e5739dbeb6ab0b201884fd9cac52a
                                                        • Opcode Fuzzy Hash: d7db186c0bbc01022ed7764f0a8fd0d2e7fc832f5a9c884cfef9bb067686a794
                                                        • Instruction Fuzzy Hash: 9F415B70F102089FEB459FA5D854BAEBBF6FF88300F20852AE105AB395DF758C459B94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f440b53e9e9941810b75f80a3b3d0ab8260746dac579c591658b2380f78cbec
                                                        • Instruction ID: 14142aea4415f138bd7266cf50e6864f8a43f415b893a7067ca1044239ecb81a
                                                        • Opcode Fuzzy Hash: 8f440b53e9e9941810b75f80a3b3d0ab8260746dac579c591658b2380f78cbec
                                                        • Instruction Fuzzy Hash: 3D418D31E1060A9FDF70CF99D880AAFF7B3FB99214F10492AE216D3640D771E8558B90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6aa9e7e1927bc3d40770997d5c9a78dd282cbe5c0d57f953f55c471f809087ae
                                                        • Instruction ID: 28c97300a04757ed835311381eac818007f4f90b07c7c35578c0e86dbf14e0d1
                                                        • Opcode Fuzzy Hash: 6aa9e7e1927bc3d40770997d5c9a78dd282cbe5c0d57f953f55c471f809087ae
                                                        • Instruction Fuzzy Hash: A4418170E1074A9FDF54DF65E4546AEBBB6FF86300F208929D505EB240EF71A841CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f4e2629a2d0fe3b3f90d930874737b727fdf04a6e73bd5dae50e48ded93d69a
                                                        • Instruction ID: 1caafebdf96376f69c87a8d9ad9d1e99b952c1512e477d58718de9080ee6f166
                                                        • Opcode Fuzzy Hash: 8f4e2629a2d0fe3b3f90d930874737b727fdf04a6e73bd5dae50e48ded93d69a
                                                        • Instruction Fuzzy Hash: F1419D30E107499FDF15DF75E8546AEBBB6FF86300F248969D505EB240EB71A842CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6544e3749f83c8f3dec236727eb2c4a072fe9e1b03c2f70b3e2721fc80a11a66
                                                        • Instruction ID: ff3da68ee5c3db16d7ffda33f6ee47139688ca50356d8d72f6550d12a6aad3e6
                                                        • Opcode Fuzzy Hash: 6544e3749f83c8f3dec236727eb2c4a072fe9e1b03c2f70b3e2721fc80a11a66
                                                        • Instruction Fuzzy Hash: F0311030B202068FDB599FB4D5546AE3BB7AF89200F254968C402EB390DF36CD46CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 934d06c6e649d7b05f89072ac8af4281f510095ad9f58d6aa06ce107538b6207
                                                        • Instruction ID: 74a431ebb0afde58931e5a1a1ed067ef390c287914962d68d5f60eb17077d488
                                                        • Opcode Fuzzy Hash: 934d06c6e649d7b05f89072ac8af4281f510095ad9f58d6aa06ce107538b6207
                                                        • Instruction Fuzzy Hash: E531E230B202468FDB58ABB4D4146AF7BE7AFC9610F244568D402EB380DF36DD42CB95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0047697061dd4ff83c1306469b487824b00531db42584996b49f7029f70b0f9f
                                                        • Instruction ID: 046479858042ae7ec47328a91badf40f24584966572f69c7614c21299570c6c1
                                                        • Opcode Fuzzy Hash: 0047697061dd4ff83c1306469b487824b00531db42584996b49f7029f70b0f9f
                                                        • Instruction Fuzzy Hash: 34317030E1061ADBCB19CFA4D89569EB7B2BF89300F10C959E916EB344DB71ED46CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 57a00cb93c3c0c4f03b0bb3d82c027a244f097ac023d3418dc9282da5f7c43b6
                                                        • Instruction ID: c606d9e312e6e99d76b056003900abe3119f70a1d076695c5b133c5a0d2128d3
                                                        • Opcode Fuzzy Hash: 57a00cb93c3c0c4f03b0bb3d82c027a244f097ac023d3418dc9282da5f7c43b6
                                                        • Instruction Fuzzy Hash: 35315030E2060A9BCB19CFA4D89569EB7B6FF89300F10C959E916EB344DB71AD46CB50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ad240199109c9a958dc42bb135f343a6b3d704ceed83f5aeaff0f9703945aaac
                                                        • Instruction ID: 94b57ebe46343ec45faae6f05f442fd26aac39a54d915acd0a94a038734f948b
                                                        • Opcode Fuzzy Hash: ad240199109c9a958dc42bb135f343a6b3d704ceed83f5aeaff0f9703945aaac
                                                        • Instruction Fuzzy Hash: 09317C71E1070A9FDB60CFA9C881BABBBF3FB94210F10492AD259D3640D770A9458B90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83c2937f4d0ceee9622dd486e02b589230552f6762e6207ae5081d07ba1537e9
                                                        • Instruction ID: 95ff565449c6492275e9fdf026ac8600efbb1e4721a518f785b43a7bb03fea88
                                                        • Opcode Fuzzy Hash: 83c2937f4d0ceee9622dd486e02b589230552f6762e6207ae5081d07ba1537e9
                                                        • Instruction Fuzzy Hash: 2E21AC71F142199FDB01DFA9D880AAEBBF5FB88310F158025E904EB394EB35D845CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 043548c8d1451ecf22ac72bb93514ec877822d1e037962bdcb8d16c3efb41b79
                                                        • Instruction ID: ce3f95eb9ef639d78e1869e8d9950b18820245effd4806b8593664b7ac3354ea
                                                        • Opcode Fuzzy Hash: 043548c8d1451ecf22ac72bb93514ec877822d1e037962bdcb8d16c3efb41b79
                                                        • Instruction Fuzzy Hash: F221AC75F202199FDB51DFA9D890AAEB7F1FB88310F158429EA15EB350EB31D800CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2608986619.000000000268D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0268D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_268d000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a85afa1db1318c6cbec4ec81ede6b3f3ea7eb2c988413c19d50a7737371f60ed
                                                        • Instruction ID: a27497cb9d16eb4148d802ef9e858a1de800a1bb1cae72b5bda997ecf7d96ecd
                                                        • Opcode Fuzzy Hash: a85afa1db1318c6cbec4ec81ede6b3f3ea7eb2c988413c19d50a7737371f60ed
                                                        • Instruction Fuzzy Hash: CF21C571504284DFDB14EF24D9C0B26BBA5FB84314F24C669E8494B3D6C376D457CA72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2608986619.000000000268D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0268D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_268d000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d3101c1ed0f178b9eef89242c39ad584cdf023ad7de5adbcf1d48766f7eb54ec
                                                        • Instruction ID: 768ebdab85dfbc85759b0b381fb1ab8ad203634b00f41a29e401f86beea4d318
                                                        • Opcode Fuzzy Hash: d3101c1ed0f178b9eef89242c39ad584cdf023ad7de5adbcf1d48766f7eb54ec
                                                        • Instruction Fuzzy Hash: AA216D7150D3C49FC703DF20D994711BF71AB46214F29C6DBD8898B2A7C33A985ACB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6801beacb256f6a80d0e2c27c37ce24626a8770b74024def4c7e3502e841286f
                                                        • Instruction ID: 97fa343479b36bb157c97b9192a4ccb2e8b45c94c85b179fe09b204a0d4dd74f
                                                        • Opcode Fuzzy Hash: 6801beacb256f6a80d0e2c27c37ce24626a8770b74024def4c7e3502e841286f
                                                        • Instruction Fuzzy Hash: 8411A535B181289BCF589B78C8546AE73EAEBC9310F058439D506EB344EF65DC0287D0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bd98d71829c0dbbfe65bb8eadd4ba3fb663748bc8192622d33e2bbb63590f7cf
                                                        • Instruction ID: 43e28755d098078573ac2a0cfd5cabf5623ef9064ee219b25cd97a9fd2f0783d
                                                        • Opcode Fuzzy Hash: bd98d71829c0dbbfe65bb8eadd4ba3fb663748bc8192622d33e2bbb63590f7cf
                                                        • Instruction Fuzzy Hash: F001D231B215104FDB25877E981479BB7EACFC5A10F10887AE51ACB382EA65DC0287D2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fd56a3bfcd2d02cf81ab6984357bee34c07064e6d451bc39f0c3bd63ce8a05d9
                                                        • Instruction ID: 4cf6c014f690fbd08864cafcb5c4f004e21595553ba834f9a79914325ecb6811
                                                        • Opcode Fuzzy Hash: fd56a3bfcd2d02cf81ab6984357bee34c07064e6d451bc39f0c3bd63ce8a05d9
                                                        • Instruction Fuzzy Hash: 3301D871B215106FCB66DB7CE890B6E37D6DBC9610F144875F10ACB391DB25DC024791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 466baa849a0e1f3f65769e7efd624acd5519ec79f4b5fae58795f25808b138cb
                                                        • Instruction ID: 85ec1053819b863e0cb7da2634acdec15de5641c11a3c307b5f43bee83b02110
                                                        • Opcode Fuzzy Hash: 466baa849a0e1f3f65769e7efd624acd5519ec79f4b5fae58795f25808b138cb
                                                        • Instruction Fuzzy Hash: 9721C0B5D01259ABCB10DF9AD884ACEFBF8FB48310F50812AE928B7250D774A544CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 55095e1e31935b5a06177757a5efe374fbeb0307e43158cda24e0cfd6d63b5d8
                                                        • Instruction ID: 0cf3cc7109471e1a8ea36055cf8fdefd79dfd40337fbabcfc08ae1e412adc6c2
                                                        • Opcode Fuzzy Hash: 55095e1e31935b5a06177757a5efe374fbeb0307e43158cda24e0cfd6d63b5d8
                                                        • Instruction Fuzzy Hash: FA018471F10110ABDB61E67CD851B5E73EAEB89710F508429F10ECB341DB29EC018785
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c7aee32779d9b0552768754fea33248a858e2ae4b656d9f2d25f0bcf255e4333
                                                        • Instruction ID: e9a013b26f8be8f3e4e823fd7817d771c67f64d905ee993447c2b0725b1cecff
                                                        • Opcode Fuzzy Hash: c7aee32779d9b0552768754fea33248a858e2ae4b656d9f2d25f0bcf255e4333
                                                        • Instruction Fuzzy Hash: 1311AFB5D01259AFCB10DF9AD884ADEFBF4FB48310F50812AE928B7250C774A954CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1a41cc470351bf07d3a1931ef7d80f715bcfbdbc2e4b1b591162cce6f8f91eb9
                                                        • Instruction ID: cf7d96c436ba434f23cdb3e23aff375d4dfadf56bd7795575b64619d7fac0b6d
                                                        • Opcode Fuzzy Hash: 1a41cc470351bf07d3a1931ef7d80f715bcfbdbc2e4b1b591162cce6f8f91eb9
                                                        • Instruction Fuzzy Hash: 21016D35B204105BDB64966ED85476BB3DADBC9A10F10883AE61EC7386EE65DC0287D1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b527332a51369ab610d64394f4e9e24b022e230fadef6e741e8027cb8228b0b7
                                                        • Instruction ID: 485aa009114773860db55a2d4250fb752a36a684abc4c067d8a1609103a3e9fa
                                                        • Opcode Fuzzy Hash: b527332a51369ab610d64394f4e9e24b022e230fadef6e741e8027cb8228b0b7
                                                        • Instruction Fuzzy Hash: F7018F76B280259BDB9896B8C9643EB72ABABC8210F454536D206E7384EE65DD0387D0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d6773af198fd9b5773c13a68206e826c264b2107f8a80efe8c57fa76c53b49c
                                                        • Instruction ID: 8cb43130694980a8083577b6eb3b1e1c383aa9a5d077d01da430001968341ad6
                                                        • Opcode Fuzzy Hash: 3d6773af198fd9b5773c13a68206e826c264b2107f8a80efe8c57fa76c53b49c
                                                        • Instruction Fuzzy Hash: 05018131B205106BDB659A3DE854B6E77DADBC9610F108829E20ECB341EF25EC024791
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa494286647fc3fcb5ff2198bf02e9cfb62453f354f93aeb3f5d0dfa42416f8d
                                                        • Instruction ID: 873ae6a58e6d0137505e81f4dc509dacb1dabe0dc1202407775753507bbe8975
                                                        • Opcode Fuzzy Hash: aa494286647fc3fcb5ff2198bf02e9cfb62453f354f93aeb3f5d0dfa42416f8d
                                                        • Instruction Fuzzy Hash: 8C013131F201109BDB65E67CD851B6E73E6EB89710F108839E51FCB344DB29EC018785
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8dc23c70fef2a85e62a796a100a629376bdab36bc9470df63dc44197ff4ba12f
                                                        • Instruction ID: 8afff116c005b032a773c86d41f0820ff48556b1aa809a2001ed6c6518115064
                                                        • Opcode Fuzzy Hash: 8dc23c70fef2a85e62a796a100a629376bdab36bc9470df63dc44197ff4ba12f
                                                        • Instruction Fuzzy Hash: 310181218393945FDB41DFB89D613CA3B64AF82218F1505E3C448CF243E2258948C7A5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24ec2e36966c36e3a2c9e4201699b96eef934909fcddc14e1225ffd28e04ee28
                                                        • Instruction ID: 730f37d1e94d5328bf78e499c493c93821f0b1c81086ac98c9fb84c9face05c5
                                                        • Opcode Fuzzy Hash: 24ec2e36966c36e3a2c9e4201699b96eef934909fcddc14e1225ffd28e04ee28
                                                        • Instruction Fuzzy Hash: 6901C832F20229ABCF189B69E84469E777AFB85750F004579EA15EB344EB31A805DBC0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f95d15f49fbdd775b4a13bedb3f9b357fc43f877f20a045951680ddd8b66171e
                                                        • Instruction ID: 4934b8636c92984fafcff305cd46d4025f2287c288e1558e9ded44a48fa0ad41
                                                        • Opcode Fuzzy Hash: f95d15f49fbdd775b4a13bedb3f9b357fc43f877f20a045951680ddd8b66171e
                                                        • Instruction Fuzzy Hash: D2F0D430E20259DFDB14DF94E899BAEBBB2BF48711F200619E506A7291CBB41C45DFC0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.2617816062.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d138504dca74f90a75ddfacdebe15f7230bae778fd5490481d6a20d0052fadb2
                                                        • Instruction ID: 448bf48c334dd88432643b18abba8d09bab6505d958f0dba0d01f22f04927ef4
                                                        • Opcode Fuzzy Hash: d138504dca74f90a75ddfacdebe15f7230bae778fd5490481d6a20d0052fadb2
                                                        • Instruction Fuzzy Hash: 47E01271E3410CABDF50EFB4DA5575E77BDDB82214F2089A5D509C7201E376DA0187C0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%