Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shipping Docs.rdf.exe

Overview

General Information

Sample name:Shipping Docs.rdf.exe
Analysis ID:1437208
MD5:f2bcf5a8f702dfe1879495f5428d2c2a
SHA1:47ce34d0266e5d0b2a884d1e53ee8099124eb3d7
SHA256:d7f670f5225888ddb631d26ccdb01a8c514965d48e15f3913348db8949b606fc
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Shipping Docs.rdf.exe (PID: 1664 cmdline: "C:\Users\user\Desktop\Shipping Docs.rdf.exe" MD5: F2BCF5A8F702DFE1879495F5428D2C2A)
    • powershell.exe (PID: 6480 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5720 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7476 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5844 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7268 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • svchost.exe (PID: 7216 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SVcPIbJno.exe (PID: 7428 cmdline: C:\Users\user\AppData\Roaming\SVcPIbJno.exe MD5: F2BCF5A8F702DFE1879495F5428D2C2A)
    • schtasks.exe (PID: 7584 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7636 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • boqXv.exe (PID: 7584 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • conhost.exe (PID: 7344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • boqXv.exe (PID: 3216 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.parsdarou.ir", "Username": "secretariat@parsdarou.ir", "Password": "wvnz2aV[mpkyjlSut-rciofxq8sdhg"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.2448473771.00000000030FC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.1231304575.0000000005A00000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      0000000E.00000002.2448473771.00000000030D2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000002.1245608119.0000000002F12000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Shipping Docs.rdf.exe.5a00000.10.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.Shipping Docs.rdf.exe.5a00000.10.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.Shipping Docs.rdf.exe.2fac5ec.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.Shipping Docs.rdf.exe.332b878.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.Shipping Docs.rdf.exe.332a860.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 31 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ParentImage: C:\Users\user\Desktop\Shipping Docs.rdf.exe, ParentProcessId: 1664, ParentProcessName: Shipping Docs.rdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ProcessId: 6480, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7268, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ParentImage: C:\Users\user\Desktop\Shipping Docs.rdf.exe, ParentProcessId: 1664, ParentProcessName: Shipping Docs.rdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ProcessId: 6480, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\SVcPIbJno.exe, ParentImage: C:\Users\user\AppData\Roaming\SVcPIbJno.exe, ParentProcessId: 7428, ParentProcessName: SVcPIbJno.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp", ProcessId: 7584, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 5.144.130.49, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7268, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49704
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ParentImage: C:\Users\user\Desktop\Shipping Docs.rdf.exe, ParentProcessId: 1664, ParentProcessName: Shipping Docs.rdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", ProcessId: 5844, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ParentImage: C:\Users\user\Desktop\Shipping Docs.rdf.exe, ParentProcessId: 1664, ParentProcessName: Shipping Docs.rdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ProcessId: 6480, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7216, ProcessName: svchost.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Docs.rdf.exe", ParentImage: C:\Users\user\Desktop\Shipping Docs.rdf.exe, ParentProcessId: 1664, ParentProcessName: Shipping Docs.rdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp", ProcessId: 5844, ProcessName: schtasks.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.parsdarou.ir", "Username": "secretariat@parsdarou.ir", "Password": "wvnz2aV[mpkyjlSut-rciofxq8sdhg"}
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeReversingLabs: Detection: 31%
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeVirustotal: Detection: 43%Perma Link
                      Source: Shipping Docs.rdf.exeVirustotal: Detection: 43%Perma Link
                      Source: Shipping Docs.rdf.exeReversingLabs: Detection: 31%
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeJoe Sandbox ML: detected
                      Source: Shipping Docs.rdf.exeJoe Sandbox ML: detected
                      Source: Shipping Docs.rdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Shipping Docs.rdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000018.00000000.1334932054.0000000000872000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000018.00000000.1334932054.0000000000872000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.7:49704 -> 5.144.130.49:587
                      Source: Joe Sandbox ViewASN Name: HOSTIRAN-NETWORKIR HOSTIRAN-NETWORKIR
                      Source: global trafficTCP traffic: 192.168.2.7:49704 -> 5.144.130.49:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.parsdarou.ir
                      Source: Shipping Docs.rdf.exe, SVcPIbJno.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: Shipping Docs.rdf.exe, SVcPIbJno.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                      Source: svchost.exe, 00000008.00000002.2450570227.000001E66B000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                      Source: qmgr.db.8.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                      Source: edb.log.8.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                      Source: RegSvcs.exe, 00000009.00000002.1245608119.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.parsdarou.ir
                      Source: Shipping Docs.rdf.exe, SVcPIbJno.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                      Source: RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0g
                      Source: RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, SVcPIbJno.exe, 0000000A.00000002.1268003499.00000000029FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 0000000E.00000002.2455852920.000000000637A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.t.co
                      Source: RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SVcPIbJno.exe, 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: edb.log.8.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                      Source: svchost.exe, 00000008.00000003.1207491337.000001E66AF20000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.8.dr, edb.log.8.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                      Source: qmgr.db.8.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
                      Source: Shipping Docs.rdf.exe, SVcPIbJno.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, 3DlgK9re6m.cs.Net Code: ctoC4ahG
                      Source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, 3DlgK9re6m.cs.Net Code: ctoC4ahG

                      System Summary

                      barindex
                      Source: 10.2.SVcPIbJno.exe.3cb8150.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Shipping Docs.rdf.exe.42768e0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 10.2.SVcPIbJno.exe.3c7d130.10.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 10.2.SVcPIbJno.exe.3cb8150.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_015BD5BC0_2_015BD5BC
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_0733AF680_2_0733AF68
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073326100_2_07332610
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073335680_2_07333568
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073355F00_2_073355F0
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073331300_2_07333130
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073331110_2_07333111
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073351B80_2_073351B8
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073351A70_2_073351A7
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_073339A00_2_073339A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D54AC89_2_02D54AC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D53EB09_2_02D53EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D541F89_2_02D541F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D5D7479_2_02D5D747
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D5CF4D9_2_02D5CF4D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D5BD8C9_2_02D5BD8C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_064232689_2_06423268
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_064242A89_2_064242A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_064200409_2_06420040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0642C0509_2_0642C050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0642E0609_2_0642E060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06429E209_2_06429E20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06428ED29_2_06428ED2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_06425A309_2_06425A30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_064253509_2_06425350
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0642399F9_2_0642399F
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_00E3D5BC10_2_00E3D5BC
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D3061A10_2_06D3061A
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D3062810_2_06D30628
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D3CA5010_2_06D3CA50
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D3737010_2_06D37370
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D3B0C810_2_06D3B0C8
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D309B010_2_06D309B0
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06D309A210_2_06D309A2
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DAA23B10_2_06DAA23B
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA261010_2_06DA2610
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA55F010_2_06DA55F0
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA356810_2_06DA3568
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA51B810_2_06DA51B8
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA39A010_2_06DA39A0
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA51A710_2_06DA51A7
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_06DA313010_2_06DA3130
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E6D65014_2_02E6D650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E6A49014_2_02E6A490
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E64AC814_2_02E64AC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E6981014_2_02E69810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E63EB014_2_02E63EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_02E641F814_2_02E641F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066AA06814_2_066AA068
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066AB90014_2_066AB900
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D326814_2_066D3268
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D42A814_2_066D42A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D004014_2_066D0040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066DE05814_2_066DE058
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066DC05014_2_066DC050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D9E2014_2_066D9E20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D8ED214_2_066D8ED2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D5A3014_2_066D5A30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D535014_2_066D5350
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066D39B014_2_066D39B0
                      Source: Shipping Docs.rdf.exeStatic PE information: invalid certificate
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename68e7e580-9894-45bf-a1e9-f80bdc1d5917.exe4 vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename68e7e580-9894-45bf-a1e9-f80bdc1d5917.exe4 vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1231778715.0000000007630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exe, 00000000.00000002.1225476521.000000000102E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exeBinary or memory string: OriginalFilenamevHRNl.exe4 vs Shipping Docs.rdf.exe
                      Source: Shipping Docs.rdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 10.2.SVcPIbJno.exe.3cb8150.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Shipping Docs.rdf.exe.42768e0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 10.2.SVcPIbJno.exe.3c7d130.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 10.2.SVcPIbJno.exe.3cb8150.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: Shipping Docs.rdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SVcPIbJno.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Shipping Docs.rdf.exe.5740000.8.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Shipping Docs.rdf.exe.5740000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Shipping Docs.rdf.exe.5740000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, kSFcfoxpqapMq8vniP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, kSFcfoxpqapMq8vniP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, IKR7ckwsAeW2I8WSmF.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@24/23@1/2
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile created: C:\Users\user\AppData\Roaming\SVcPIbJno.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMutant created: \Sessions\1\BaseNamedObjects\qondEeZwLeuxpKEThIayRRlXfal
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7396:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6464:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4248:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7592:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2912:120:WilError_03
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF63B.tmpJump to behavior
                      Source: Shipping Docs.rdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Shipping Docs.rdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Shipping Docs.rdf.exeVirustotal: Detection: 43%
                      Source: Shipping Docs.rdf.exeReversingLabs: Detection: 31%
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile read: C:\Users\user\Desktop\Shipping Docs.rdf.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Shipping Docs.rdf.exe "C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\SVcPIbJno.exe C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: Shipping Docs.rdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Shipping Docs.rdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000018.00000000.1334932054.0000000000872000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000018.00000000.1334932054.0000000000872000.00000002.00000001.01000000.0000000E.sdmp, boqXv.exe.9.dr

                      Data Obfuscation

                      barindex
                      Source: Shipping Docs.rdf.exe, TestLogin.cs.Net Code: LateBinding.LateCall((object)methodInfo, (Type)null, "Invoke", new object[2]{0,new string[3]{BN[0],BN[1],"bus_ticket"}}, (string[])null, (bool[])null)
                      Source: SVcPIbJno.exe.0.dr, TestLogin.cs.Net Code: LateBinding.LateCall((object)methodInfo, (Type)null, "Invoke", new object[2]{0,new string[3]{BN[0],BN[1],"bus_ticket"}}, (string[])null, (bool[])null)
                      Source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.Shipping Docs.rdf.exe.5a00000.10.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.Shipping Docs.rdf.exe.5740000.8.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, IKR7ckwsAeW2I8WSmF.cs.Net Code: uuZKD2kgiA System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Shipping Docs.rdf.exe.3f69970.6.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, IKR7ckwsAeW2I8WSmF.cs.Net Code: uuZKD2kgiA System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeCode function: 0_2_015BF110 pushad ; iretd 0_2_015BF111
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02D5BB14 push esp; ret 9_2_02D5BB15
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeCode function: 10_2_00E3F110 pushad ; iretd 10_2_00E3F111
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066AFCBC push 00000006h; retf 14_2_066AFCC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_066DFD30 push es; ret 14_2_066DFD40
                      Source: Shipping Docs.rdf.exeStatic PE information: section name: .text entropy: 7.942823265219137
                      Source: SVcPIbJno.exe.0.drStatic PE information: section name: .text entropy: 7.942823265219137
                      Source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, IKR7ckwsAeW2I8WSmF.csHigh entropy of concatenated method names: 'u5c0F1uDVA', 'zKx0cYNlC6', 'hR80iGeqXd', 'cTL0CDT4GJ', 'eFe0bdQM0O', 'o0O0jfJkLB', 'sXP0R4HbJe', 'hWC07PSP4R', 'KjA0HolcBC', 'pwv0kKVSFl'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, F9xah8s38D8Z9bRVrh.csHigh entropy of concatenated method names: 'kLVeRhFmcF', 'Q1Ue7WNapq', 'MOLekvZjax', 'j6yeUm2Wov', 'GWlemCnbDj', 'Y0yeS5rttN', 'smyU8rRjRCG2h0p51L', 'wxU56aUHQeVUahlpy4', 'dtDeeWpumU', 'jh9e06jraG'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, pm8bMBTPh5xSudOLbd.csHigh entropy of concatenated method names: 'VfAj68TVv7', 'up0j2eUtBc', 'X2hjhjIxRB', 'ToString', 'NuSj3VXunK', 'BDhjNyxbUN', 'hUcnQFmViR5CsrKEhE7', 'yd0RInm11TiFpWWqlKP', 'deshIJm8uXsEM7cgYZM'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, k3gpj7V3na4wrI7IiM.csHigh entropy of concatenated method names: 'j6cukYOBQP', 'f2XuUysg7l', 'ToString', 'LwtuchvqeT', 'jloui1J0rV', 'tQIuCk7SsN', 'L21ubhmlEa', 'UyOujf0oKy', 'PpxuRaHyKK', 'DFAu7x4POB'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, uQ91NhyaYsgKkZVDbc.csHigh entropy of concatenated method names: 'GNEtcPj99B', 'UIDtiASoNw', 'ElYtCFqMRf', 'Mdbtbq1TRq', 'CxbtjWHk2P', 'S0NtROcJa3', 'SUmt7ksSog', 'URqtHxmMHG', 'nQrtkGsLLZ', 'jnqtU1VbhG'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, WPVqipkq52M3mAxZ6Ws.csHigh entropy of concatenated method names: 'kULlLA4tDm', 'rlMlw6g5XN', 'n1dlDsDClw', 'BiQlf4g62D', 'TexlQcWLwm', 'QxilWLv200', 'ITllpFyCJv', 'SqRl5v5Mjo', 'JC4lBvBbbs', 'OCSlEcl2RI'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, kSFcfoxpqapMq8vniP.csHigh entropy of concatenated method names: 'PVAiaLo2U7', 'OtPiX5gJ9T', 'miei6H0ADW', 'KYii2Cc9KU', 'n6yihWJHiC', 'zxoi3O7eeH', 'ycIiN3ClKV', 'ALMivwNYcV', 'I1vioDUYMo', 'UJei4Uv0be'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, UqEhJt4WpTU8jsh7qW.csHigh entropy of concatenated method names: 'tQ2uvXpEq8', 'qGau4UIiSv', 'e6atgtaEaw', 'H7yteCi39f', 'EdCuYDsCCB', 'NvvuTZKH5L', 'VuTuVWA4Hm', 'yo1uaJy8xl', 'DMeuXaQIjE', 'r6Tu6MIZAw'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, xKFl98X4DqOQ7bA4Ob.csHigh entropy of concatenated method names: 'VVh95qtLRR', 'i3s9BHkV4R', 'bqw98DdMuX', 'Ev39dM1cnS', 'pYW9OdlPcp', 'x4T9qnxHMO', 's7o9Pw86Uj', 'OIF9MN2pVf', 'sUq9r1mdMN', 'NNn9YMeP6x'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, ylyiwQ3VO4ca2cvhIW.csHigh entropy of concatenated method names: 'IduleUGSXN', 'vqDl0QdYXN', 'lM8lKKXftt', 'esClclIqMT', 'K66lioU7l2', 'JMFlbTWmgX', 'F0wljWPXKH', 'dqHtN5QNVB', 'Yh8tvUl5mq', 'jULtoUCSsv'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, dgu8mJNX4A8UAuhHuM.csHigh entropy of concatenated method names: 'PjnCf0qOsS', 'fUjCW3Aclq', 'qlOC5BKhrb', 'ioqCBZEN4F', 'gDwCmSL1xi', 'UpYCSNxlDR', 'wLLCu2eMp3', 'BC1Ctu3qmd', 'MxlCltmkGo', 'o8qCn4QcoU'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, pmvCnj8bxgmuSfyOAU.csHigh entropy of concatenated method names: 'qOBDDYkgN', 'R2XfhvSTZ', 'jZZWtXESx', 'nulpgn3US', 'Uf8ByootM', 'GnGES8QGC', 'S9xBjkZDmXa3YJlLy5', 'sEpMPpfgXiCw0oCdRE', 'wjktVjuPc', 'jaPnOZoWo'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, GEWKpAgD3dPXOjnpe8.csHigh entropy of concatenated method names: 'gOKmrlbpUL', 'T9amTZ96nI', 'IROmajvZG1', 'YvImXvTyT4', 'bVYmdiW4fK', 'g9amZvKPJ3', 'YQcmO6bxr5', 'r5PmqeMg7P', 'oCtmAqEPv9', 'bfcmPVkLXe'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, x5UP6g57eR6BuGFalB.csHigh entropy of concatenated method names: 'AK7jF2mrd3', 'sImji2oKUD', 'CCTjbIAK0y', 'AmZjRJugtB', 'oMhj7Hb9f2', 'Q2CbhkDf2D', 'Lfmb3MJdTP', 'PgQbNDTTgp', 'q8BbvCOG64', 'GCwboD68uZ'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, jHOVYAkGT7FZlCjGfFC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'haNnaP4yVA', 'LpZnXEVniO', 'Qa8n6xUkTF', 'xddn2B16sv', 'vsInh3Se9A', 'WbMn319Ujb', 'eJ1nNVTZuU'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, EUG49yz5iwX31fQFvl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rP9l9A4A9g', 'nA6lmsV5lu', 'mcalSkfIUI', 'EYVlu9NTEZ', 'gcbltih4Xk', 'jh4llRVscH', 'do1ln50D1i'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, hypUvkpCCgeQfNF8wV.csHigh entropy of concatenated method names: 'Dispose', 'WTLeoGNwGp', 'j42ydJJd2B', 'xp4GGptCRk', 'GIpe4BMo2b', 'elleztXe8V', 'ProcessDialogKey', 'WYkygMYtNb', 'A8Nyei363V', 'CUAyyV6ms9'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, Cy7HG3aywFwISt4Wrk.csHigh entropy of concatenated method names: 'dEObQ3lnk3', 'fq7bpErw62', 'K6BCZUC12j', 'lmsCOxJbhp', 'q0QCq7kIo1', 'e3oCAvWi2M', 'eAsCPe9NEx', 'wUPCMXjKid', 'thoCx4bpLB', 'OvxCrkwru1'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, p5GJybW7oEL1Da8TAb.csHigh entropy of concatenated method names: 'rInRLDeHIT', 'hedRwWiqLY', 'fi3RDi2I3k', 'BC6RfaF5wv', 'j74RQoX0UZ', 'vaLRWnF8ya', 'IS7RpD0MdM', 'qS5R5Ll4lG', 'cY8RBFhvJT', 'PB2RE86kFU'
                      Source: 0.2.Shipping Docs.rdf.exe.43514d0.4.raw.unpack, RYA81qZGjXlQOMDt04.csHigh entropy of concatenated method names: 'nd0t8PDl0R', 'dC3tdWqy6m', 'wYvtZgnsTY', 'raptOGsg3R', 'qZKtae10ye', 'In2tq4R26S', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, IKR7ckwsAeW2I8WSmF.csHigh entropy of concatenated method names: 'u5c0F1uDVA', 'zKx0cYNlC6', 'hR80iGeqXd', 'cTL0CDT4GJ', 'eFe0bdQM0O', 'o0O0jfJkLB', 'sXP0R4HbJe', 'hWC07PSP4R', 'KjA0HolcBC', 'pwv0kKVSFl'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, F9xah8s38D8Z9bRVrh.csHigh entropy of concatenated method names: 'kLVeRhFmcF', 'Q1Ue7WNapq', 'MOLekvZjax', 'j6yeUm2Wov', 'GWlemCnbDj', 'Y0yeS5rttN', 'smyU8rRjRCG2h0p51L', 'wxU56aUHQeVUahlpy4', 'dtDeeWpumU', 'jh9e06jraG'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, pm8bMBTPh5xSudOLbd.csHigh entropy of concatenated method names: 'VfAj68TVv7', 'up0j2eUtBc', 'X2hjhjIxRB', 'ToString', 'NuSj3VXunK', 'BDhjNyxbUN', 'hUcnQFmViR5CsrKEhE7', 'yd0RInm11TiFpWWqlKP', 'deshIJm8uXsEM7cgYZM'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, k3gpj7V3na4wrI7IiM.csHigh entropy of concatenated method names: 'j6cukYOBQP', 'f2XuUysg7l', 'ToString', 'LwtuchvqeT', 'jloui1J0rV', 'tQIuCk7SsN', 'L21ubhmlEa', 'UyOujf0oKy', 'PpxuRaHyKK', 'DFAu7x4POB'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, uQ91NhyaYsgKkZVDbc.csHigh entropy of concatenated method names: 'GNEtcPj99B', 'UIDtiASoNw', 'ElYtCFqMRf', 'Mdbtbq1TRq', 'CxbtjWHk2P', 'S0NtROcJa3', 'SUmt7ksSog', 'URqtHxmMHG', 'nQrtkGsLLZ', 'jnqtU1VbhG'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, WPVqipkq52M3mAxZ6Ws.csHigh entropy of concatenated method names: 'kULlLA4tDm', 'rlMlw6g5XN', 'n1dlDsDClw', 'BiQlf4g62D', 'TexlQcWLwm', 'QxilWLv200', 'ITllpFyCJv', 'SqRl5v5Mjo', 'JC4lBvBbbs', 'OCSlEcl2RI'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, kSFcfoxpqapMq8vniP.csHigh entropy of concatenated method names: 'PVAiaLo2U7', 'OtPiX5gJ9T', 'miei6H0ADW', 'KYii2Cc9KU', 'n6yihWJHiC', 'zxoi3O7eeH', 'ycIiN3ClKV', 'ALMivwNYcV', 'I1vioDUYMo', 'UJei4Uv0be'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, UqEhJt4WpTU8jsh7qW.csHigh entropy of concatenated method names: 'tQ2uvXpEq8', 'qGau4UIiSv', 'e6atgtaEaw', 'H7yteCi39f', 'EdCuYDsCCB', 'NvvuTZKH5L', 'VuTuVWA4Hm', 'yo1uaJy8xl', 'DMeuXaQIjE', 'r6Tu6MIZAw'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, xKFl98X4DqOQ7bA4Ob.csHigh entropy of concatenated method names: 'VVh95qtLRR', 'i3s9BHkV4R', 'bqw98DdMuX', 'Ev39dM1cnS', 'pYW9OdlPcp', 'x4T9qnxHMO', 's7o9Pw86Uj', 'OIF9MN2pVf', 'sUq9r1mdMN', 'NNn9YMeP6x'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, ylyiwQ3VO4ca2cvhIW.csHigh entropy of concatenated method names: 'IduleUGSXN', 'vqDl0QdYXN', 'lM8lKKXftt', 'esClclIqMT', 'K66lioU7l2', 'JMFlbTWmgX', 'F0wljWPXKH', 'dqHtN5QNVB', 'Yh8tvUl5mq', 'jULtoUCSsv'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, dgu8mJNX4A8UAuhHuM.csHigh entropy of concatenated method names: 'PjnCf0qOsS', 'fUjCW3Aclq', 'qlOC5BKhrb', 'ioqCBZEN4F', 'gDwCmSL1xi', 'UpYCSNxlDR', 'wLLCu2eMp3', 'BC1Ctu3qmd', 'MxlCltmkGo', 'o8qCn4QcoU'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, pmvCnj8bxgmuSfyOAU.csHigh entropy of concatenated method names: 'qOBDDYkgN', 'R2XfhvSTZ', 'jZZWtXESx', 'nulpgn3US', 'Uf8ByootM', 'GnGES8QGC', 'S9xBjkZDmXa3YJlLy5', 'sEpMPpfgXiCw0oCdRE', 'wjktVjuPc', 'jaPnOZoWo'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, GEWKpAgD3dPXOjnpe8.csHigh entropy of concatenated method names: 'gOKmrlbpUL', 'T9amTZ96nI', 'IROmajvZG1', 'YvImXvTyT4', 'bVYmdiW4fK', 'g9amZvKPJ3', 'YQcmO6bxr5', 'r5PmqeMg7P', 'oCtmAqEPv9', 'bfcmPVkLXe'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, x5UP6g57eR6BuGFalB.csHigh entropy of concatenated method names: 'AK7jF2mrd3', 'sImji2oKUD', 'CCTjbIAK0y', 'AmZjRJugtB', 'oMhj7Hb9f2', 'Q2CbhkDf2D', 'Lfmb3MJdTP', 'PgQbNDTTgp', 'q8BbvCOG64', 'GCwboD68uZ'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, jHOVYAkGT7FZlCjGfFC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'haNnaP4yVA', 'LpZnXEVniO', 'Qa8n6xUkTF', 'xddn2B16sv', 'vsInh3Se9A', 'WbMn319Ujb', 'eJ1nNVTZuU'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, EUG49yz5iwX31fQFvl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rP9l9A4A9g', 'nA6lmsV5lu', 'mcalSkfIUI', 'EYVlu9NTEZ', 'gcbltih4Xk', 'jh4llRVscH', 'do1ln50D1i'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, hypUvkpCCgeQfNF8wV.csHigh entropy of concatenated method names: 'Dispose', 'WTLeoGNwGp', 'j42ydJJd2B', 'xp4GGptCRk', 'GIpe4BMo2b', 'elleztXe8V', 'ProcessDialogKey', 'WYkygMYtNb', 'A8Nyei363V', 'CUAyyV6ms9'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, Cy7HG3aywFwISt4Wrk.csHigh entropy of concatenated method names: 'dEObQ3lnk3', 'fq7bpErw62', 'K6BCZUC12j', 'lmsCOxJbhp', 'q0QCq7kIo1', 'e3oCAvWi2M', 'eAsCPe9NEx', 'wUPCMXjKid', 'thoCx4bpLB', 'OvxCrkwru1'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, p5GJybW7oEL1Da8TAb.csHigh entropy of concatenated method names: 'rInRLDeHIT', 'hedRwWiqLY', 'fi3RDi2I3k', 'BC6RfaF5wv', 'j74RQoX0UZ', 'vaLRWnF8ya', 'IS7RpD0MdM', 'qS5R5Ll4lG', 'cY8RBFhvJT', 'PB2RE86kFU'
                      Source: 0.2.Shipping Docs.rdf.exe.7630000.11.raw.unpack, RYA81qZGjXlQOMDt04.csHigh entropy of concatenated method names: 'nd0t8PDl0R', 'dC3tdWqy6m', 'wYvtZgnsTY', 'raptOGsg3R', 'qZKtae10ye', 'In2tq4R26S', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Shipping Docs.rdf.exe.5a00000.10.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeFile created: C:\Users\user\AppData\Roaming\SVcPIbJno.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Shipping Docs.rdf.exe PID: 1664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SVcPIbJno.exe PID: 7428, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 7A00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 8A00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 8BA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: 9BA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: C90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 49A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 74D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 84D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 8670000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: 9670000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: E50000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2BE0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2A20000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: C60000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 29E0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 11A0000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3397Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5008Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 989Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2197Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2202
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4063
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exe TID: 7036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5568Thread sleep count: 3397 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7396Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7400Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7260Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7336Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exe TID: 7472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 7532Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 7448Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99889Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99669Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99560Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99124Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98796Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98455Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98218Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99751
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99625
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99515
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99390
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99281
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99166
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98745
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98421
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98183
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97892
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97766
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97641
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97512
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97269
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97141
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96906
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96796
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96686
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96562
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96384
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96281
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96172
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96062
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477
                      Source: svchost.exe, 00000008.00000002.2448074833.000001E665A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2450817917.000001E66B058000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: RegSvcs.exe, 00000009.00000002.1249521421.00000000062E2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F04008Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E30008Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeQueries volume information: C:\Users\user\Desktop\Shipping Docs.rdf.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeQueries volume information: C:\Users\user\AppData\Roaming\SVcPIbJno.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SVcPIbJno.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Docs.rdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1245608119.0000000002F12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1245608119.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.000000000306C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Docs.rdf.exe PID: 1664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7268, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SVcPIbJno.exe PID: 7428, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7636, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.5a00000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.5a00000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.332b878.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.332a860.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.32f0450.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1231304575.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1227838638.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1245608119.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.000000000306C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Docs.rdf.exe PID: 1664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7268, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SVcPIbJno.exe PID: 7428, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7636, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3cb8150.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.SVcPIbJno.exe.3c7d130.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.42768e0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.423b8c0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1245608119.0000000002F12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1245608119.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2448473771.000000000306C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Docs.rdf.exe PID: 1664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7268, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SVcPIbJno.exe PID: 7428, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7636, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.5a00000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.5a00000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.332b878.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.332a860.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.32f0450.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Docs.rdf.exe.2fac5ec.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1231304575.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1227838638.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      34
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      1
                      Registry Run Keys / Startup Folder
                      1
                      Scheduled Task/Job
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      221
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Registry Run Keys / Startup Folder
                      22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets151
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                      Virtualization/Sandbox Evasion
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Hidden Files and Directories
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1437208 Sample: Shipping Docs.rdf.exe Startdate: 07/05/2024 Architecture: WINDOWS Score: 100 56 mail.parsdarou.ir 2->56 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 Sigma detected: Scheduled temp file as task from temp location 2->66 68 13 other signatures 2->68 8 Shipping Docs.rdf.exe 7 2->8         started        12 SVcPIbJno.exe 5 2->12         started        14 svchost.exe 1 1 2->14         started        17 boqXv.exe 2->17         started        signatures3 process4 dnsIp5 52 C:\Users\user\AppData\Roaming\SVcPIbJno.exe, PE32 8->52 dropped 54 C:\Users\user\AppData\Local\...\tmpF63B.tmp, XML 8->54 dropped 84 Suspicious powershell command line found 8->84 86 Writes to foreign memory regions 8->86 88 Allocates memory in foreign processes 8->88 90 Adds a directory exclusion to Windows Defender 8->90 19 RegSvcs.exe 1 4 8->19         started        24 powershell.exe 23 8->24         started        26 powershell.exe 23 8->26         started        28 schtasks.exe 1 8->28         started        92 Multi AV Scanner detection for dropped file 12->92 94 Machine Learning detection for dropped file 12->94 96 Injects a PE file into a foreign processes 12->96 30 RegSvcs.exe 12->30         started        32 schtasks.exe 12->32         started        34 boqXv.exe 12->34         started        60 127.0.0.1 unknown unknown 14->60 36 conhost.exe 17->36         started        file6 signatures7 process8 dnsIp9 58 mail.parsdarou.ir 5.144.130.49, 49704, 49706, 587 HOSTIRAN-NETWORKIR Iran (ISLAMIC Republic Of) 19->58 50 C:\Users\user\AppData\Roaming\...\boqXv.exe, PE32 19->50 dropped 70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 19->70 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->72 74 Loading BitLocker PowerShell Module 24->74 38 conhost.exe 24->38         started        40 WmiPrvSE.exe 24->40         started        42 conhost.exe 26->42         started        44 conhost.exe 28->44         started        76 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 30->76 78 Tries to steal Mail credentials (via file / registry access) 30->78 80 Tries to harvest and steal ftp login credentials 30->80 82 Tries to harvest and steal browser information (history, passwords, etc) 30->82 46 conhost.exe 32->46         started        48 conhost.exe 34->48         started        file10 signatures11 process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Shipping Docs.rdf.exe44%VirustotalBrowse
                      Shipping Docs.rdf.exe32%ReversingLabsWin32.Trojan.Generic
                      Shipping Docs.rdf.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\SVcPIbJno.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\SVcPIbJno.exe32%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Roaming\SVcPIbJno.exe44%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.parsdarou.ir1%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      http://mail.parsdarou.ir0%Avira URL Cloudsafe
                      http://r3.i.lencr.org/0g0%Avira URL Cloudsafe
                      http://mail.parsdarou.ir1%VirustotalBrowse
                      http://r3.i.lencr.org/0g0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.parsdarou.ir
                      5.144.130.49
                      truetrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://r3.o.lencr.org0RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000008.00000003.1207491337.000001E66AF20000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.8.dr, edb.log.8.drfalse
                        high
                        http://crl.ver)svchost.exe, 00000008.00000002.2450570227.000001E66B000000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://g.live.com/odclientsettings/Prod1C:edb.log.8.drfalse
                          high
                          https://account.dyn.com/Shipping Docs.rdf.exe, 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SVcPIbJno.exe, 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://r3.i.lencr.org/0gRegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameShipping Docs.rdf.exe, 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, SVcPIbJno.exe, 0000000A.00000002.1268003499.00000000029FC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.t.coRegSvcs.exe, 0000000E.00000002.2455852920.000000000637A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.chiark.greenend.org.uk/~sgtatham/putty/0Shipping Docs.rdf.exe, SVcPIbJno.exe.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://x1.c.lencr.org/0RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://x1.i.lencr.org/0RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2455852920.0000000006330000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://mail.parsdarou.irRegSvcs.exe, 00000009.00000002.1245608119.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2448473771.00000000030DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                • 1%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                5.144.130.49
                                mail.parsdarou.irIran (ISLAMIC Republic Of)
                                59441HOSTIRAN-NETWORKIRtrue
                                IP
                                127.0.0.1
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1437208
                                Start date and time:2024-05-07 07:19:05 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 51s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:33
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Shipping Docs.rdf.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@24/23@1/2
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 124
                                • Number of non-executed functions: 9
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.51.58.94
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, time.windows.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target boqXv.exe, PID 3216 because it is empty
                                • Execution Graph export aborted for target boqXv.exe, PID 7584 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtCreateKey calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                07:19:53API Interceptor2x Sleep call for process: Shipping Docs.rdf.exe modified
                                07:19:55Task SchedulerRun new task: SVcPIbJno path: C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                                07:19:55API Interceptor2x Sleep call for process: svchost.exe modified
                                07:19:55API Interceptor29x Sleep call for process: powershell.exe modified
                                07:19:56API Interceptor48x Sleep call for process: RegSvcs.exe modified
                                07:19:57API Interceptor2x Sleep call for process: SVcPIbJno.exe modified
                                07:19:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                07:20:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                5.144.130.49PAYMENT LIST.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  PO# CV-PO23002552.PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    https://wro16kdfl.lavinphysio.com/?qp=c2FuYWJyaWF0QGhpbGxzYm9yb3VnaGNvdW50eS5vcmc=Get hashmaliciousUnknownBrowse
                                      http://www.checkpointmarketing.net/newsletter/linkShim.cfm?key=362983194G2589J6588285N9N118124&link=https://aqvpaxxbr.lavinphysio.com/?qp=dGFtaUBnaGVlbmlycmlnYXRpb24uY29tGet hashmaliciousHTMLPhisherBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        mail.parsdarou.irPAYMENT LIST.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.49
                                        PO# CV-PO23002552.PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.49
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        HOSTIRAN-NETWORKIRPAYMENT LIST.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.49
                                        PO# CV-PO23002552.PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.49
                                        PO# CV-PO23002552.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.35
                                        Overdue Account.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 5.144.130.35
                                        https://hamrahansystem.com/4xe3cx/?PliaTEYmfRshGet hashmaliciousUnknownBrowse
                                        • 45.138.134.33
                                        Saham_Man.apkGet hashmaliciousIRATABrowse
                                        • 5.144.130.58
                                        Invoice-AWB-Document.doc.exeGet hashmaliciousAgentTeslaBrowse
                                        • 5.144.130.32
                                        https://wro16kdfl.lavinphysio.com/?qp=c2FuYWJyaWF0QGhpbGxzYm9yb3VnaGNvdW50eS5vcmc=Get hashmaliciousUnknownBrowse
                                        • 5.144.130.49
                                        http://www.checkpointmarketing.net/newsletter/linkShim.cfm?key=362983194G2589J6588285N9N118124&link=https://aqvpaxxbr.lavinphysio.com/?qp=dGFtaUBnaGVlbmlycmlnYXRpb24uY29tGet hashmaliciousHTMLPhisherBrowse
                                        • 5.144.130.49
                                        TT_0034578218845301 Advice.xlsxGet hashmaliciousFormBookBrowse
                                        • 185.173.105.99
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMAR-2024 SOA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          New Point of Contact for Corporate Courier Account - DHL.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            MAR-2024 SOA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              New Point of Contact for Corporate Courier Account - DHL.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                bank slip.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  PAYMENT LIST.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                                      I7336446-receipt.vbsGet hashmaliciousXWormBrowse
                                                        S94847456-receipt.vbsGet hashmaliciousXWormBrowse
                                                          Transfer copy PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):1310720
                                                            Entropy (8bit):0.7066931759349981
                                                            Encrypted:false
                                                            SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6VqZ:2JIB/wUKUKQncEmYRTwh0d
                                                            MD5:424C86203EE79E3BA00E1843D2273442
                                                            SHA1:023D96581FBC380ED1428F785F17847CB65C0B8C
                                                            SHA-256:E4D082CD1712392DE143C3DCE2ED322B2B757611E47999A51164A90970B97158
                                                            SHA-512:E4FE1FF7DF451139124C2D44D89350B7A750EBB2F0761DB2B64F0DE94118C8A74935089DDA8A45F69D874817FF11998D78388471A10436F3FB21345248C63A39
                                                            Malicious:false
                                                            Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x937ffc4b, page size 16384, DirtyShutdown, Windows version 10.0
                                                            Category:dropped
                                                            Size (bytes):1310720
                                                            Entropy (8bit):0.7899668915619623
                                                            Encrypted:false
                                                            SSDEEP:1536:bSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:bazaPvgurTd42UgSii
                                                            MD5:F16798D0DAF6B609CE9738BCEF4CBEC1
                                                            SHA1:7A22AE4542BF30E21975ACE4D40087FA8C73F4E8
                                                            SHA-256:6483F9EFB39C17C8EA0E5E3E995AD4470D8219B89435AB0A196B76D414066C15
                                                            SHA-512:73AD8F9C761B2C9B60E0B9FD3152C56E39E7E366BB4109C658AE6649354AA8F0C6A979390F4B360ABE98EC6FB22D0731D08A0A37EDFC8E7239C244E57F24FD29
                                                            Malicious:false
                                                            Preview:...K... ...............X\...;...{......................0.`.....42...{5.7....|M.h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{......................................7....|M.................-.n.7....|M..........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):16384
                                                            Entropy (8bit):0.08193220428518491
                                                            Encrypted:false
                                                            SSDEEP:3:lell/EYellxg1t/57Dek3JEASCP/ollEqW3l/TjzzQ/t:lel6zllxgHR3tESPAmd8/
                                                            MD5:5FD4DE2DC97B4D4CCD0CFCC3037A00E5
                                                            SHA1:2BD0B1A1458914D8CC37B4FD5BA15C608123A760
                                                            SHA-256:FB8D83501D9C86232BCE41D6C1696FF7266E44DDDE012CC752BEC81E98F1E880
                                                            SHA-512:3A371CFDD8F951C3468FAB29307E12819DE96F6E519A5390950A9DCCB21E0E5B78E1204C935C65D7C7F5367D4E6BD7CF3CC59CA460BB43970734E3EF84168D0E
                                                            Malicious:false
                                                            Preview:G.Q......................................;...{..7....|M.42...{5.........42...{5.42...{5...Y.42...{59................-.n.7....|M.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\Desktop\Shipping Docs.rdf.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):142
                                                            Entropy (8bit):5.090621108356562
                                                            Encrypted:false
                                                            SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                            MD5:8C0458BB9EA02D50565175E38D577E35
                                                            SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                            SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                            SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.379401388151058
                                                            Encrypted:false
                                                            SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:fLHxvIIwLgZ2KRHWLOug8s
                                                            MD5:AF15464AFD6EB7D301162A1DC8E01662
                                                            SHA1:A974B8FEC71BF837B8E72FE43AB43E447FC43A86
                                                            SHA-256:103A67F6744C098E5121D2D732753DFA4B54FA0EFD918FEC3941A3C052F5E211
                                                            SHA-512:7B5B7B7F6EAE4544BAF61F9C02BF0138950E5D7D1B0457DE2FAB2C4C484220BDD1AB42D6884838E798AD46CE1B5B5426CEB825A1690B1190857D3B643ABFAB37
                                                            Malicious:false
                                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1603
                                                            Entropy (8bit):5.122805929585587
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtYoxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTYIv
                                                            MD5:8E37546E105C8186E75E11705E172F89
                                                            SHA1:302FED7DDF4B5031A3C621F47862845FB3962D05
                                                            SHA-256:313FA80567376BB3CA096061220E276AD14456B40963B1510C55844BA8F95A76
                                                            SHA-512:93F1CA829FFF1A91D39001B58E71154ADFE340B36B3086822F423A07B80997EB1B0B673AE98A5F3A5606AA903A6BE3DA9EE0F3837993D4165C3924C2F82584F1
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                            Process:C:\Users\user\Desktop\Shipping Docs.rdf.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1603
                                                            Entropy (8bit):5.122805929585587
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtYoxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTYIv
                                                            MD5:8E37546E105C8186E75E11705E172F89
                                                            SHA1:302FED7DDF4B5031A3C621F47862845FB3962D05
                                                            SHA-256:313FA80567376BB3CA096061220E276AD14456B40963B1510C55844BA8F95A76
                                                            SHA-512:93F1CA829FFF1A91D39001B58E71154ADFE340B36B3086822F423A07B80997EB1B0B673AE98A5F3A5606AA903A6BE3DA9EE0F3837993D4165C3924C2F82584F1
                                                            Malicious:true
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                            Process:C:\Users\user\Desktop\Shipping Docs.rdf.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):742920
                                                            Entropy (8bit):7.9251722256375015
                                                            Encrypted:false
                                                            SSDEEP:12288:qYE8BkorZInC3yGs1X1UmaSudfjMmxdB/L+6Jhwd/SHGkR:BE8BT9Eusp1UmaS8oCBMQHd
                                                            MD5:F2BCF5A8F702DFE1879495F5428D2C2A
                                                            SHA1:47CE34D0266E5D0B2A884D1E53EE8099124EB3D7
                                                            SHA-256:D7F670F5225888DDB631D26CCDB01A8C514965D48E15F3913348DB8949B606FC
                                                            SHA-512:C8A8C2293927B97C33599F77D343F2B91C31F814790E7FF4891998EBDF12A149AB33A7E44B471043ABDF1F38E9386F6E30A1ADCEBCCA4E5F51EF328B3773B128
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 32%
                                                            • Antivirus: Virustotal, Detection: 44%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z9f..............0...... ........... ... ....@.. .......................`............@.................................x...O.... ............... ...6...@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\Shipping Docs.rdf.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:false
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:modified
                                                            Size (bytes):45984
                                                            Entropy (8bit):6.16795797263964
                                                            Encrypted:false
                                                            SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                            MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                            SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                            SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                            SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Joe Sandbox View:
                                                            • Filename: MAR-2024 SOA.exe, Detection: malicious, Browse
                                                            • Filename: New Point of Contact for Corporate Courier Account - DHL.exe, Detection: malicious, Browse
                                                            • Filename: MAR-2024 SOA.exe, Detection: malicious, Browse
                                                            • Filename: New Point of Contact for Corporate Courier Account - DHL.exe, Detection: malicious, Browse
                                                            • Filename: bank slip.exe, Detection: malicious, Browse
                                                            • Filename: PAYMENT LIST.exe, Detection: malicious, Browse
                                                            • Filename: E7236252-receipt.vbs, Detection: malicious, Browse
                                                            • Filename: I7336446-receipt.vbs, Detection: malicious, Browse
                                                            • Filename: S94847456-receipt.vbs, Detection: malicious, Browse
                                                            • Filename: Transfer copy PDF.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:JSON data
                                                            Category:dropped
                                                            Size (bytes):55
                                                            Entropy (8bit):4.306461250274409
                                                            Encrypted:false
                                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                            Malicious:false
                                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                            Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1141
                                                            Entropy (8bit):4.442398121585593
                                                            Encrypted:false
                                                            SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                            MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                            SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                            SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                            SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                            Malicious:false
                                                            Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.9251722256375015
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                            • Win32 Executable (generic) a (10002005/4) 49.93%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:Shipping Docs.rdf.exe
                                                            File size:742'920 bytes
                                                            MD5:f2bcf5a8f702dfe1879495f5428d2c2a
                                                            SHA1:47ce34d0266e5d0b2a884d1e53ee8099124eb3d7
                                                            SHA256:d7f670f5225888ddb631d26ccdb01a8c514965d48e15f3913348db8949b606fc
                                                            SHA512:c8a8c2293927b97c33599f77d343f2b91c31f814790e7ff4891998ebdf12a149ab33a7e44b471043abdf1f38e9386f6e30a1adcebcca4e5f51ef328b3773b128
                                                            SSDEEP:12288:qYE8BkorZInC3yGs1X1UmaSudfjMmxdB/L+6Jhwd/SHGkR:BE8BT9Eusp1UmaS8oCBMQHd
                                                            TLSH:58F4228AF3483B71D0BD8BF19045610617F8A41FA5B6D72F4ED360DD2AA1F128A90F67
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z9f..............0...... ........... ... ....@.. .......................`............@................................
                                                            Icon Hash:3470b89eb29a90c0
                                                            Entrypoint:0x4b12ca
                                                            Entrypoint Section:.text
                                                            Digitally signed:true
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x66397AD8 [Tue May 7 00:50:32 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Signature Valid:false
                                                            Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                            Signature Validation Error:The digital signature of the object did not verify
                                                            Error Number:-2146869232
                                                            Not Before, Not After
                                                            • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                                            Subject Chain
                                                            • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                            Version:3
                                                            Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                            Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                            Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                            Serial:7C1118CBBADC95DA3752C46E47A27438
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            xor al, 47h
                                                            push ebx
                                                            inc edi
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            dec ebx
                                                            inc ebp
                                                            dec edi
                                                            xor eax, 00000047h
                                                            xor al, 48h
                                                            dec eax
                                                            inc ecx
                                                            xor eax, 38543451h
                                                            inc edi
                                                            inc esp
                                                            push esi
                                                            push ecx
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb12780x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x14ec.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xb20000x3608
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xaf2f00xaf8009d83da22068f75144d0d1c93da29b431False0.9361993077813391data7.942823265219137IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xb20000x14ec0x180099932a7c60ab731cfb83ad9278a6c60dFalse0.6300455729166666data7.158900728310187IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xb40000xc0x80070608950008f9c5f455862375c12eb03False0.015625data0.03037337037012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xb21600xf3bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8120030777122339
                                                            RT_GROUP_ICON0xb309c0x14data0.9
                                                            RT_GROUP_ICON0xb30b00x14data1.05
                                                            RT_VERSION0xb30c40x23cdata0.4772727272727273
                                                            RT_MANIFEST0xb33000x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 7, 2024 07:19:58.130868912 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:19:58.377826929 CEST587497045.144.130.49192.168.2.7
                                                            May 7, 2024 07:19:58.377901077 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:19:59.049958944 CEST587497045.144.130.49192.168.2.7
                                                            May 7, 2024 07:19:59.050597906 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:19:59.297710896 CEST587497045.144.130.49192.168.2.7
                                                            May 7, 2024 07:19:59.297877073 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:19:59.546984911 CEST587497045.144.130.49192.168.2.7
                                                            May 7, 2024 07:19:59.621776104 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:00.236130953 CEST49704587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:00.486560106 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:00.746314049 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:00.746490002 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.011665106 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.011879921 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.271899939 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.272182941 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.534440041 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.590471029 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.698796034 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.979480028 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.979500055 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.979506016 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:01.979567051 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:01.998265982 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:02.259243965 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:02.403196096 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:02.419747114 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:02.679822922 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:02.709256887 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:02.978844881 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:02.979928017 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:03.283173084 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.375591993 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.375893116 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:03.636085987 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.636131048 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.636415958 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:03.936464071 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.939698935 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:03.946429014 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:04.206254005 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.206269979 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.207062006 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:04.207119942 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:04.207149029 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:04.207166910 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:20:04.466969967 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.466988087 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.467334032 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.476037025 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:20:04.606082916 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:21:40.497698069 CEST49706587192.168.2.75.144.130.49
                                                            May 7, 2024 07:21:40.758300066 CEST587497065.144.130.49192.168.2.7
                                                            May 7, 2024 07:21:40.761985064 CEST49706587192.168.2.75.144.130.49
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 7, 2024 07:19:57.613868952 CEST5236853192.168.2.71.1.1.1
                                                            May 7, 2024 07:19:58.117702007 CEST53523681.1.1.1192.168.2.7
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            May 7, 2024 07:19:57.613868952 CEST192.168.2.71.1.1.10x5dabStandard query (0)mail.parsdarou.irA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            May 7, 2024 07:19:58.117702007 CEST1.1.1.1192.168.2.70x5dabNo error (0)mail.parsdarou.ir5.144.130.49A (IP address)IN (0x0001)false
                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            May 7, 2024 07:19:59.049958944 CEST587497045.144.130.49192.168.2.7220-linux19.centraldnserver.com ESMTP Exim 4.96.2 #2 Tue, 07 May 2024 08:49:58 +0330
                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                            220 and/or bulk e-mail.
                                                            May 7, 2024 07:19:59.050597906 CEST49704587192.168.2.75.144.130.49EHLO 035347
                                                            May 7, 2024 07:19:59.297710896 CEST587497045.144.130.49192.168.2.7250-linux19.centraldnserver.com Hello 035347 [156.146.37.102]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-STARTTLS
                                                            250 HELP
                                                            May 7, 2024 07:19:59.297877073 CEST49704587192.168.2.75.144.130.49STARTTLS
                                                            May 7, 2024 07:19:59.546984911 CEST587497045.144.130.49192.168.2.7220 TLS go ahead
                                                            May 7, 2024 07:20:01.011665106 CEST587497065.144.130.49192.168.2.7220-linux19.centraldnserver.com ESMTP Exim 4.96.2 #2 Tue, 07 May 2024 08:50:00 +0330
                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                            220 and/or bulk e-mail.
                                                            May 7, 2024 07:20:01.011879921 CEST49706587192.168.2.75.144.130.49EHLO 035347
                                                            May 7, 2024 07:20:01.271899939 CEST587497065.144.130.49192.168.2.7250-linux19.centraldnserver.com Hello 035347 [156.146.37.102]
                                                            250-SIZE 52428800
                                                            250-8BITMIME
                                                            250-PIPELINING
                                                            250-PIPECONNECT
                                                            250-STARTTLS
                                                            250 HELP
                                                            May 7, 2024 07:20:01.272182941 CEST49706587192.168.2.75.144.130.49STARTTLS
                                                            May 7, 2024 07:20:01.534440041 CEST587497065.144.130.49192.168.2.7220 TLS go ahead

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:07:19:53
                                                            Start date:07/05/2024
                                                            Path:C:\Users\user\Desktop\Shipping Docs.rdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                                                            Imagebase:0xaf0000
                                                            File size:742'920 bytes
                                                            MD5 hash:F2BCF5A8F702DFE1879495F5428D2C2A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1231304575.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1229585940.000000000423B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1227838638.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1227838638.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Shipping Docs.rdf.exe"
                                                            Imagebase:0x600000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SVcPIbJno.exe"
                                                            Imagebase:0x600000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmpF63B.tmp"
                                                            Imagebase:0xc20000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                            Imagebase:0x7ff7b4ee0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:9
                                                            Start time:07:19:54
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                            Imagebase:0xc10000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1245608119.0000000002F12000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1241904701.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1245608119.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1245608119.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:07:19:55
                                                            Start date:07/05/2024
                                                            Path:C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\SVcPIbJno.exe
                                                            Imagebase:0x5b0000
                                                            File size:742'920 bytes
                                                            MD5 hash:F2BCF5A8F702DFE1879495F5428D2C2A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1282453180.0000000003C7D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 32%, ReversingLabs
                                                            • Detection: 44%, Virustotal, Browse
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:07:19:57
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff7fb730000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:07:19:58
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SVcPIbJno" /XML "C:\Users\user\AppData\Local\Temp\tmp59D.tmp"
                                                            Imagebase:0xc20000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:07:19:58
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:07:19:58
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                            Imagebase:0xd80000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2448473771.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2448473771.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2448473771.000000000306C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2448473771.000000000306C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:24
                                                            Start time:07:20:08
                                                            Start date:07/05/2024
                                                            Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                            Imagebase:0x870000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 0%, ReversingLabs
                                                            • Detection: 0%, Virustotal, Browse
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:25
                                                            Start time:07:20:08
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:29
                                                            Start time:07:20:18
                                                            Start date:07/05/2024
                                                            Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                                            Imagebase:0x3c0000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:30
                                                            Start time:07:20:18
                                                            Start date:07/05/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:268
                                                              Total number of Limit Nodes:20
                                                              execution_graph 24054 7336882 24055 73367ac 24054->24055 24056 733680a 24054->24056 24056->24055 24060 7338fa8 24056->24060 24083 733900e 24056->24083 24107 7338f98 24056->24107 24061 7338fc2 24060->24061 24130 73393f1 24061->24130 24135 73395f3 24061->24135 24145 7339a8c 24061->24145 24155 733968c 24061->24155 24160 73397cd 24061->24160 24169 73398ce 24061->24169 24182 73394ce 24061->24182 24188 733970f 24061->24188 24193 7339cca 24061->24193 24197 73396cb 24061->24197 24207 73393c6 24061->24207 24212 73397e0 24061->24212 24217 73395a1 24061->24217 24222 733985e 24061->24222 24227 733945e 24061->24227 24232 73395df 24061->24232 24237 7339794 24061->24237 24241 73394d4 24061->24241 24247 7339570 24061->24247 24252 7339531 24061->24252 24062 7338fca 24062->24055 24084 7338f9c 24083->24084 24086 7339011 24083->24086 24087 73395f3 4 API calls 24084->24087 24088 73393f1 2 API calls 24084->24088 24089 7339531 4 API calls 24084->24089 24090 7339570 2 API calls 24084->24090 24091 73394d4 2 API calls 24084->24091 24092 7339794 2 API calls 24084->24092 24093 73395df 2 API calls 24084->24093 24094 733945e 2 API calls 24084->24094 24095 733985e 2 API calls 24084->24095 24096 73395a1 2 API calls 24084->24096 24097 73397e0 2 API calls 24084->24097 24098 73393c6 2 API calls 24084->24098 24099 73396cb 4 API calls 24084->24099 24100 7339cca 2 API calls 24084->24100 24101 733970f 2 API calls 24084->24101 24102 73394ce 2 API calls 24084->24102 24103 73398ce 6 API calls 24084->24103 24104 73397cd 4 API calls 24084->24104 24105 733968c 2 API calls 24084->24105 24106 7339a8c 4 API calls 24084->24106 24085 7338fca 24085->24055 24086->24055 24087->24085 24088->24085 24089->24085 24090->24085 24091->24085 24092->24085 24093->24085 24094->24085 24095->24085 24096->24085 24097->24085 24098->24085 24099->24085 24100->24085 24101->24085 24102->24085 24103->24085 24104->24085 24105->24085 24106->24085 24108 7338fa8 24107->24108 24110 73395f3 4 API calls 24108->24110 24111 73393f1 2 API calls 24108->24111 24112 7339531 4 API calls 24108->24112 24113 7339570 2 API calls 24108->24113 24114 73394d4 2 API calls 24108->24114 24115 7339794 2 API calls 24108->24115 24116 73395df 2 API calls 24108->24116 24117 733945e 2 API calls 24108->24117 24118 733985e 2 API calls 24108->24118 24119 73395a1 2 API calls 24108->24119 24120 73397e0 2 API calls 24108->24120 24121 73393c6 2 API calls 24108->24121 24122 73396cb 4 API calls 24108->24122 24123 7339cca 2 API calls 24108->24123 24124 733970f 2 API calls 24108->24124 24125 73394ce 2 API calls 24108->24125 24126 73398ce 6 API calls 24108->24126 24127 73397cd 4 API calls 24108->24127 24128 733968c 2 API calls 24108->24128 24129 7339a8c 4 API calls 24108->24129 24109 7338fca 24109->24055 24110->24109 24111->24109 24112->24109 24113->24109 24114->24109 24115->24109 24116->24109 24117->24109 24118->24109 24119->24109 24120->24109 24121->24109 24122->24109 24123->24109 24124->24109 24125->24109 24126->24109 24127->24109 24128->24109 24129->24109 24131 7339403 24130->24131 24262 7336170 24131->24262 24266 7336165 24131->24266 24136 733953d 24135->24136 24137 733954f 24136->24137 24140 7339e2e 24136->24140 24270 7335ae8 24136->24270 24274 7335ae0 24136->24274 24138 7339da6 24137->24138 24278 7335029 24137->24278 24282 7335030 24137->24282 24139 733974d 24139->24062 24140->24062 24148 733953d 24145->24148 24146 733954f 24147 7339da6 24146->24147 24151 7335030 ResumeThread 24146->24151 24152 7335029 ResumeThread 24146->24152 24148->24146 24150 7339e2e 24148->24150 24153 7335ae0 WriteProcessMemory 24148->24153 24154 7335ae8 WriteProcessMemory 24148->24154 24149 733974d 24149->24062 24150->24062 24151->24149 24152->24149 24153->24148 24154->24148 24156 7339692 24155->24156 24286 7335bd0 24156->24286 24290 7335bd8 24156->24290 24157 7339d49 24157->24062 24161 7339793 24160->24161 24164 73396aa 24160->24164 24162 73397ae 24161->24162 24294 73350e0 24161->24294 24298 73350d8 24161->24298 24162->24062 24163 7339f16 24164->24163 24165 7335bd0 ReadProcessMemory 24164->24165 24166 7335bd8 ReadProcessMemory 24164->24166 24165->24162 24166->24162 24170 73398db 24169->24170 24174 733953d 24170->24174 24176 73350e0 Wow64SetThreadContext 24170->24176 24177 73350d8 Wow64SetThreadContext 24170->24177 24171 733954f 24172 7339da6 24171->24172 24178 7335030 ResumeThread 24171->24178 24179 7335029 ResumeThread 24171->24179 24173 733974d 24173->24062 24174->24171 24175 7339e2e 24174->24175 24180 7335ae0 WriteProcessMemory 24174->24180 24181 7335ae8 WriteProcessMemory 24174->24181 24175->24062 24176->24170 24177->24170 24178->24173 24179->24173 24180->24174 24181->24174 24183 73393d4 24182->24183 24184 73394b2 24183->24184 24186 7336170 CreateProcessA 24183->24186 24187 7336165 CreateProcessA 24183->24187 24184->24062 24185 7339512 24185->24062 24186->24185 24187->24185 24189 7339738 24188->24189 24191 7335030 ResumeThread 24189->24191 24192 7335029 ResumeThread 24189->24192 24190 733974d 24190->24062 24191->24190 24192->24190 24194 7339cec 24193->24194 24302 7335a20 24193->24302 24306 7335a28 24193->24306 24203 7335ae0 WriteProcessMemory 24197->24203 24204 7335ae8 WriteProcessMemory 24197->24204 24198 7339e2e 24198->24062 24199 733953d 24199->24197 24199->24198 24200 733954f 24199->24200 24201 7339da6 24200->24201 24205 7335030 ResumeThread 24200->24205 24206 7335029 ResumeThread 24200->24206 24202 733974d 24202->24062 24203->24199 24204->24199 24205->24202 24206->24202 24208 73393f9 24207->24208 24210 7336170 CreateProcessA 24208->24210 24211 7336165 CreateProcessA 24208->24211 24209 7339512 24209->24062 24210->24209 24211->24209 24213 733958b 24212->24213 24214 733974d 24212->24214 24215 7335030 ResumeThread 24213->24215 24216 7335029 ResumeThread 24213->24216 24214->24062 24215->24214 24216->24214 24218 73395ca 24217->24218 24220 7335a20 VirtualAllocEx 24218->24220 24221 7335a28 VirtualAllocEx 24218->24221 24219 7339cec 24220->24219 24221->24219 24223 7339881 24222->24223 24225 7335ae0 WriteProcessMemory 24223->24225 24226 7335ae8 WriteProcessMemory 24223->24226 24224 73399de 24224->24062 24225->24224 24226->24224 24228 73393d4 24227->24228 24230 7336170 CreateProcessA 24228->24230 24231 7336165 CreateProcessA 24228->24231 24229 7339512 24229->24062 24230->24229 24231->24229 24233 73395ec 24232->24233 24235 7335ae0 WriteProcessMemory 24233->24235 24236 7335ae8 WriteProcessMemory 24233->24236 24234 7339ed4 24235->24234 24236->24234 24239 73350e0 Wow64SetThreadContext 24237->24239 24240 73350d8 Wow64SetThreadContext 24237->24240 24238 73397ae 24238->24062 24239->24238 24240->24238 24244 73393d4 24241->24244 24242 73394b2 24242->24062 24243 7339512 24243->24062 24244->24242 24245 7336170 CreateProcessA 24244->24245 24246 7336165 CreateProcessA 24244->24246 24245->24243 24246->24243 24248 733957a 24247->24248 24250 7335030 ResumeThread 24248->24250 24251 7335029 ResumeThread 24248->24251 24249 733974d 24249->24062 24250->24249 24251->24249 24255 733953d 24252->24255 24253 733954f 24254 7339da6 24253->24254 24258 7335030 ResumeThread 24253->24258 24259 7335029 ResumeThread 24253->24259 24255->24253 24257 7339e2e 24255->24257 24260 7335ae0 WriteProcessMemory 24255->24260 24261 7335ae8 WriteProcessMemory 24255->24261 24256 733974d 24256->24062 24257->24062 24258->24256 24259->24256 24260->24255 24261->24255 24263 73361f9 CreateProcessA 24262->24263 24265 73363bb 24263->24265 24267 7336170 CreateProcessA 24266->24267 24269 73363bb 24267->24269 24271 7335b30 WriteProcessMemory 24270->24271 24273 7335b87 24271->24273 24273->24136 24275 7335b30 WriteProcessMemory 24274->24275 24277 7335b87 24275->24277 24277->24136 24279 7335070 ResumeThread 24278->24279 24281 73350a1 24279->24281 24281->24139 24283 7335070 ResumeThread 24282->24283 24285 73350a1 24283->24285 24285->24139 24287 7335c23 ReadProcessMemory 24286->24287 24289 7335c67 24287->24289 24289->24157 24291 7335c23 ReadProcessMemory 24290->24291 24293 7335c67 24291->24293 24293->24157 24295 7335125 Wow64SetThreadContext 24294->24295 24297 733516d 24295->24297 24297->24162 24299 7335125 Wow64SetThreadContext 24298->24299 24301 733516d 24299->24301 24301->24162 24303 7335a68 VirtualAllocEx 24302->24303 24305 7335aa5 24303->24305 24305->24194 24307 7335a68 VirtualAllocEx 24306->24307 24309 7335aa5 24307->24309 24309->24194 24015 733a1d0 24016 733a35b 24015->24016 24018 733a1f6 24015->24018 24018->24016 24019 7335e6c 24018->24019 24020 733a450 PostMessageW 24019->24020 24021 733a4bc 24020->24021 24021->24018 24310 15b4668 24311 15b467a 24310->24311 24312 15b4686 24311->24312 24314 15b4779 24311->24314 24315 15b479d 24314->24315 24319 15b4878 24315->24319 24323 15b4888 24315->24323 24320 15b48af 24319->24320 24321 15b498c 24320->24321 24327 15b44b0 24320->24327 24324 15b48af 24323->24324 24325 15b498c 24324->24325 24326 15b44b0 CreateActCtxA 24324->24326 24326->24325 24328 15b5918 CreateActCtxA 24327->24328 24330 15b59db 24328->24330 24001 15bd751 24002 15bd714 DuplicateHandle 24001->24002 24004 15bd75a 24001->24004 24003 15bd726 24002->24003 24005 15bd040 24006 15bd086 GetCurrentProcess 24005->24006 24008 15bd0d8 GetCurrentThread 24006->24008 24009 15bd0d1 24006->24009 24010 15bd115 GetCurrentProcess 24008->24010 24011 15bd10e 24008->24011 24009->24008 24012 15bd14b 24010->24012 24011->24010 24013 15bd173 GetCurrentThreadId 24012->24013 24014 15bd1a4 24013->24014 24022 15bacb0 24026 15bada8 24022->24026 24034 15bad97 24022->24034 24023 15bacbf 24027 15badb9 24026->24027 24028 15baddc 24026->24028 24027->24028 24042 15bb040 24027->24042 24046 15bb030 24027->24046 24028->24023 24029 15badd4 24029->24028 24030 15bafe0 GetModuleHandleW 24029->24030 24031 15bb00d 24030->24031 24031->24023 24035 15badb9 24034->24035 24036 15baddc 24034->24036 24035->24036 24040 15bb040 LoadLibraryExW 24035->24040 24041 15bb030 LoadLibraryExW 24035->24041 24036->24023 24037 15badd4 24037->24036 24038 15bafe0 GetModuleHandleW 24037->24038 24039 15bb00d 24038->24039 24039->24023 24040->24037 24041->24037 24043 15bb054 24042->24043 24044 15bb079 24043->24044 24050 15ba130 24043->24050 24044->24029 24047 15bb054 24046->24047 24048 15bb079 24047->24048 24049 15ba130 LoadLibraryExW 24047->24049 24048->24029 24049->24048 24051 15bb220 LoadLibraryExW 24050->24051 24053 15bb299 24051->24053 24053->24044
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b4f305b8db18aa769241477cb2c31bdf283be357a6646525d1f0a16bd51ddf94
                                                              • Instruction ID: 0531a0e942827e4abc28b855f952b84c1da0a7c23e19583341524be00ee939e9
                                                              • Opcode Fuzzy Hash: b4f305b8db18aa769241477cb2c31bdf283be357a6646525d1f0a16bd51ddf94
                                                              • Instruction Fuzzy Hash: 3DE19DF1B016469FEB29DB65C450BAEB7F6AFC8300F14846DE14ADB294CB39D902CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 294 15bd031-15bd0cf GetCurrentProcess 298 15bd0d8-15bd10c GetCurrentThread 294->298 299 15bd0d1-15bd0d7 294->299 300 15bd10e-15bd114 298->300 301 15bd115-15bd149 GetCurrentProcess 298->301 299->298 300->301 302 15bd14b-15bd151 301->302 303 15bd152-15bd16d call 15bd618 301->303 302->303 307 15bd173-15bd1a2 GetCurrentThreadId 303->307 308 15bd1ab-15bd20d 307->308 309 15bd1a4-15bd1aa 307->309 309->308
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 015BD0BE
                                                              • GetCurrentThread.KERNEL32 ref: 015BD0FB
                                                              • GetCurrentProcess.KERNEL32 ref: 015BD138
                                                              • GetCurrentThreadId.KERNEL32 ref: 015BD191
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: e0e295d1318428fadc7e13d8fe51bfea88599e92abe40b4696ab9513449bcf52
                                                              • Instruction ID: 79ccd6df30cb60cb52f6862fc3a2d6e17de9c4ef4f2cb87b6667edb0bd670dd8
                                                              • Opcode Fuzzy Hash: e0e295d1318428fadc7e13d8fe51bfea88599e92abe40b4696ab9513449bcf52
                                                              • Instruction Fuzzy Hash: 205134B49012498FEB18CFA9C588BEEBBF1FF88314F248459E119AB3A0D7745944CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 316 15bd040-15bd0cf GetCurrentProcess 320 15bd0d8-15bd10c GetCurrentThread 316->320 321 15bd0d1-15bd0d7 316->321 322 15bd10e-15bd114 320->322 323 15bd115-15bd149 GetCurrentProcess 320->323 321->320 322->323 324 15bd14b-15bd151 323->324 325 15bd152-15bd16d call 15bd618 323->325 324->325 329 15bd173-15bd1a2 GetCurrentThreadId 325->329 330 15bd1ab-15bd20d 329->330 331 15bd1a4-15bd1aa 329->331 331->330
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 015BD0BE
                                                              • GetCurrentThread.KERNEL32 ref: 015BD0FB
                                                              • GetCurrentProcess.KERNEL32 ref: 015BD138
                                                              • GetCurrentThreadId.KERNEL32 ref: 015BD191
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 10d6c039346a8255307cad8a28b757b33a2f65f918593b4cb3549bbe6083f9f1
                                                              • Instruction ID: 2f9033de474b7e7818f23d65278168a5458b21584b9f088390730a0dde1535dd
                                                              • Opcode Fuzzy Hash: 10d6c039346a8255307cad8a28b757b33a2f65f918593b4cb3549bbe6083f9f1
                                                              • Instruction Fuzzy Hash: 3A5145B4901209CFEB18DFA9C988BDEBBF1FF88314F208459E119AB3A0D7745844CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 447 7336165-7336205 450 7336207-7336211 447->450 451 733623e-733625e 447->451 450->451 452 7336213-7336215 450->452 458 7336260-733626a 451->458 459 7336297-73362c6 451->459 453 7336217-7336221 452->453 454 7336238-733623b 452->454 456 7336223 453->456 457 7336225-7336234 453->457 454->451 456->457 457->457 460 7336236 457->460 458->459 461 733626c-733626e 458->461 465 73362c8-73362d2 459->465 466 73362ff-73363b9 CreateProcessA 459->466 460->454 463 7336291-7336294 461->463 464 7336270-733627a 461->464 463->459 467 733627e-733628d 464->467 468 733627c 464->468 465->466 470 73362d4-73362d6 465->470 479 73363c2-7336448 466->479 480 73363bb-73363c1 466->480 467->467 469 733628f 467->469 468->467 469->463 471 73362f9-73362fc 470->471 472 73362d8-73362e2 470->472 471->466 474 73362e6-73362f5 472->474 475 73362e4 472->475 474->474 477 73362f7 474->477 475->474 477->471 490 733644a-733644e 479->490 491 7336458-733645c 479->491 480->479 490->491 492 7336450 490->492 493 733645e-7336462 491->493 494 733646c-7336470 491->494 492->491 493->494 495 7336464 493->495 496 7336472-7336476 494->496 497 7336480-7336484 494->497 495->494 496->497 498 7336478 496->498 499 7336496-733649d 497->499 500 7336486-733648c 497->500 498->497 501 73364b4 499->501 502 733649f-73364ae 499->502 500->499 504 73364b5 501->504 502->501 504->504
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 073363A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: d3f9ff37310d72522f452d5d1d0506ae19d573ce6f331601929912cd39624d69
                                                              • Instruction ID: bf338b50e7a7b0554c514803f150242434c66fde018407dd5e0e3c7e4bbf32ee
                                                              • Opcode Fuzzy Hash: d3f9ff37310d72522f452d5d1d0506ae19d573ce6f331601929912cd39624d69
                                                              • Instruction Fuzzy Hash: A4A14CB1D00319DFEB24DFA8C841BDDBBB2BF48310F158169E809A7250DB759985CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 505 7336170-7336205 507 7336207-7336211 505->507 508 733623e-733625e 505->508 507->508 509 7336213-7336215 507->509 515 7336260-733626a 508->515 516 7336297-73362c6 508->516 510 7336217-7336221 509->510 511 7336238-733623b 509->511 513 7336223 510->513 514 7336225-7336234 510->514 511->508 513->514 514->514 517 7336236 514->517 515->516 518 733626c-733626e 515->518 522 73362c8-73362d2 516->522 523 73362ff-73363b9 CreateProcessA 516->523 517->511 520 7336291-7336294 518->520 521 7336270-733627a 518->521 520->516 524 733627e-733628d 521->524 525 733627c 521->525 522->523 527 73362d4-73362d6 522->527 536 73363c2-7336448 523->536 537 73363bb-73363c1 523->537 524->524 526 733628f 524->526 525->524 526->520 528 73362f9-73362fc 527->528 529 73362d8-73362e2 527->529 528->523 531 73362e6-73362f5 529->531 532 73362e4 529->532 531->531 534 73362f7 531->534 532->531 534->528 547 733644a-733644e 536->547 548 7336458-733645c 536->548 537->536 547->548 549 7336450 547->549 550 733645e-7336462 548->550 551 733646c-7336470 548->551 549->548 550->551 552 7336464 550->552 553 7336472-7336476 551->553 554 7336480-7336484 551->554 552->551 553->554 555 7336478 553->555 556 7336496-733649d 554->556 557 7336486-733648c 554->557 555->554 558 73364b4 556->558 559 733649f-73364ae 556->559 557->556 561 73364b5 558->561 559->558 561->561
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 073363A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: fa89ca86d7ff170b9d7be7d08a6cdc08e959f2889a4dba73761c20b6ac859dde
                                                              • Instruction ID: 2333eaf26ab7832c5dfba9821121ee0c78d5d8f5832a8aa3319f7faa6a8d9b5d
                                                              • Opcode Fuzzy Hash: fa89ca86d7ff170b9d7be7d08a6cdc08e959f2889a4dba73761c20b6ac859dde
                                                              • Instruction Fuzzy Hash: 6D914CB1D00319DFEB24DFA8C841BEDBBB2BF48314F158169E809A7250DB759985CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 562 15bada8-15badb7 563 15badb9-15badc6 call 15ba0cc 562->563 564 15bade3-15bade7 562->564 571 15badc8 563->571 572 15baddc 563->572 566 15badfb-15bae3c 564->566 567 15bade9-15badf3 564->567 573 15bae49-15bae57 566->573 574 15bae3e-15bae46 566->574 567->566 617 15badce call 15bb040 571->617 618 15badce call 15bb030 571->618 572->564 575 15bae7b-15bae7d 573->575 576 15bae59-15bae5e 573->576 574->573 581 15bae80-15bae87 575->581 578 15bae69 576->578 579 15bae60-15bae67 call 15ba0d8 576->579 577 15badd4-15badd6 577->572 580 15baf18-15bafd8 577->580 583 15bae6b-15bae79 578->583 579->583 612 15bafda-15bafdd 580->612 613 15bafe0-15bb00b GetModuleHandleW 580->613 584 15bae89-15bae91 581->584 585 15bae94-15bae9b 581->585 583->581 584->585 588 15baea8-15baeaa call 15ba0e8 585->588 589 15bae9d-15baea5 585->589 591 15baeaf-15baeb1 588->591 589->588 593 15baebe-15baec3 591->593 594 15baeb3-15baebb 591->594 595 15baee1-15baeee 593->595 596 15baec5-15baecc 593->596 594->593 603 15baf11-15baf17 595->603 604 15baef0-15baf0e 595->604 596->595 598 15baece-15baede call 15ba0f8 call 15ba108 596->598 598->595 604->603 612->613 614 15bb00d-15bb013 613->614 615 15bb014-15bb028 613->615 614->615 617->577 618->577
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 015BAFFE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 31f5b1a4e55aab12425e18e67e03511ad3008fc4fca1a3504f7cfe54868991ef
                                                              • Instruction ID: d3161ecca587559406aaa6d171465ae16dd0a85ce4fa58283037e8ee052a0487
                                                              • Opcode Fuzzy Hash: 31f5b1a4e55aab12425e18e67e03511ad3008fc4fca1a3504f7cfe54868991ef
                                                              • Instruction Fuzzy Hash: 77714A70A00B098FE724DF29D49579ABBF1FF88304F00892ED49ADBA50D775E849CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 619 15b44b0-15b59d9 CreateActCtxA 622 15b59db-15b59e1 619->622 623 15b59e2-15b5a3c 619->623 622->623 630 15b5a4b-15b5a4f 623->630 631 15b5a3e-15b5a41 623->631 632 15b5a51-15b5a5d 630->632 633 15b5a60 630->633 631->630 632->633 635 15b5a61 633->635 635->635
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 015B59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 56e46eeb5ceb17b840aa0983a27b3875b527a4ea47ffb248448428d02837b1c6
                                                              • Instruction ID: f155cf8765c922c2fae4767c01057bccf3d3e5bcae7154f5a2a3cc0995c25ce5
                                                              • Opcode Fuzzy Hash: 56e46eeb5ceb17b840aa0983a27b3875b527a4ea47ffb248448428d02837b1c6
                                                              • Instruction Fuzzy Hash: 5841C170C00719CBEB28DFAAC8847CDBBB5BF49304F20846AD509AB251DBB55945CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 636 15b590d-15b5912 637 15b591c-15b59d9 CreateActCtxA 636->637 639 15b59db-15b59e1 637->639 640 15b59e2-15b5a3c 637->640 639->640 647 15b5a4b-15b5a4f 640->647 648 15b5a3e-15b5a41 640->648 649 15b5a51-15b5a5d 647->649 650 15b5a60 647->650 648->647 649->650 652 15b5a61 650->652 652->652
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 015B59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 60ed7fe25f9a46f6c8490f58990be0dfcf834d055aa7c457d4e0b70a17588b99
                                                              • Instruction ID: 8932c47523988ae9f1add6890b52fc0ca058d342df6d0288f26b8229399cece6
                                                              • Opcode Fuzzy Hash: 60ed7fe25f9a46f6c8490f58990be0dfcf834d055aa7c457d4e0b70a17588b99
                                                              • Instruction Fuzzy Hash: 0041D271C00719CFEB28DFA9C8847CDBBB5BF49304F20846AD519AB251DBB5594ACF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 653 15bd751-15bd758 654 15bd75a-15bd87e 653->654 655 15bd714-15bd724 DuplicateHandle 653->655 656 15bd72d-15bd74a 655->656 657 15bd726-15bd72c 655->657 657->656
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015BD717
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: e2196a8c7c801f2f93a4e960b69d88a4e6e15fd90c94cdf3cda9aa386a819c62
                                                              • Instruction ID: 4624435c391edab235f1e64e2cd4c10015a592742eaf80ab0092fe37052b7ede
                                                              • Opcode Fuzzy Hash: e2196a8c7c801f2f93a4e960b69d88a4e6e15fd90c94cdf3cda9aa386a819c62
                                                              • Instruction Fuzzy Hash: C4316E74A403889FFB049F60E4567697BBAF7C4350F518939EA218F3C5CBB45855CB10
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 671 7335ae0-7335b36 673 7335b46-7335b85 WriteProcessMemory 671->673 674 7335b38-7335b44 671->674 676 7335b87-7335b8d 673->676 677 7335b8e-7335bbe 673->677 674->673 676->677
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07335B78
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 81df468cf5807e0b8ab8dea0a4922fef3ec9564b4e8b3947fe2183463ac946b7
                                                              • Instruction ID: 8db3d88acb55ac59ab58fadaaee6f33cbcf8ba21b7bdf61ff3b7f41b25cb35b3
                                                              • Opcode Fuzzy Hash: 81df468cf5807e0b8ab8dea0a4922fef3ec9564b4e8b3947fe2183463ac946b7
                                                              • Instruction Fuzzy Hash: EB2113B6900349DFDB14CFA9C981BEEBBF1FF48310F10842AE919A7240D7799954CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 681 7335ae8-7335b36 683 7335b46-7335b85 WriteProcessMemory 681->683 684 7335b38-7335b44 681->684 686 7335b87-7335b8d 683->686 687 7335b8e-7335bbe 683->687 684->683 686->687
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07335B78
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: d0ce82a77e50ba9f82d2e5e77e5ab59e375699e098583d93dd00a6160f4eea81
                                                              • Instruction ID: 2216df934e2a1e7c459f67fd82612ea9c83dd4184e51b1f1362e7d0fc0544cef
                                                              • Opcode Fuzzy Hash: d0ce82a77e50ba9f82d2e5e77e5ab59e375699e098583d93dd00a6160f4eea81
                                                              • Instruction Fuzzy Hash: 7B2125B5900349DFDB14CFAAC881BEEBBF5FF48310F10842AE919A7240C7799950CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 701 7335bd0-7335c65 ReadProcessMemory 704 7335c67-7335c6d 701->704 705 7335c6e-7335c9e 701->705 704->705
                                                              APIs
                                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07335C58
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: cf152f5fbd69be8abd5eadfbd03b085173a102fc38b87a6005b413a726aeddb7
                                                              • Instruction ID: 2bbd5192996fbc9a45212b816dfe7f178b6bafdea9a7a63ca6c88dd1579845d3
                                                              • Opcode Fuzzy Hash: cf152f5fbd69be8abd5eadfbd03b085173a102fc38b87a6005b413a726aeddb7
                                                              • Instruction Fuzzy Hash: BC2123B2C003099FDB10CFAAC981BEEBBF1FF48310F14882AE958A7240C77895418B60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 691 73350d8-733512b 693 733513b-733516b Wow64SetThreadContext 691->693 694 733512d-7335139 691->694 696 7335174-73351a4 693->696 697 733516d-7335173 693->697 694->693 697->696
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0733515E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 671c0de90534f678b576f512541c206b6fac1c7b002b9155271eddcd5103feed
                                                              • Instruction ID: d496d457c9e9edc6b57d49e39c60476da6e8d1dfe2d0e9a7d50dbb3f74f5dd7c
                                                              • Opcode Fuzzy Hash: 671c0de90534f678b576f512541c206b6fac1c7b002b9155271eddcd5103feed
                                                              • Instruction Fuzzy Hash: 4F2138B5D003098FEB14CFAAC5857EEBBF4EF48210F14842AD459AB341DB789945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07335C58
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: cc6d1388a34f3d9bc98fb3f5afd5b8cb928189fefcec9bec7a800939c7455ebf
                                                              • Instruction ID: 4d6f52a9c0fe8051b3c2e5891a7b371750941ec879fbba0caaf33181c1f3368c
                                                              • Opcode Fuzzy Hash: cc6d1388a34f3d9bc98fb3f5afd5b8cb928189fefcec9bec7a800939c7455ebf
                                                              • Instruction Fuzzy Hash: 662125B1C003499FDB14DFAAC880BEEBBF5FF48310F14842AE959A7240C7799940CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0733515E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 250b1b498883b33707bc230c281a4635d8565a6faa60d42de5f52255fd5855d8
                                                              • Instruction ID: 86cfcba725dfe116436db1ac6294400e86491dcf18ba44249f16ece408f8538d
                                                              • Opcode Fuzzy Hash: 250b1b498883b33707bc230c281a4635d8565a6faa60d42de5f52255fd5855d8
                                                              • Instruction Fuzzy Hash: 792138B1D003098FEB24DFAAC4857EEBBF4EF48210F14842AD459A7240CB789945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015BD717
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: b25246257d6ab5ecc64a9e248c72709df5d6f48fd85d246f6868abdd4d817f53
                                                              • Instruction ID: 29d430889e35e2d937c0b9e40d5d3fe38039e769e41abd77e057154b8d9c57d4
                                                              • Opcode Fuzzy Hash: b25246257d6ab5ecc64a9e248c72709df5d6f48fd85d246f6868abdd4d817f53
                                                              • Instruction Fuzzy Hash: D321E3B5D00248DFDB10CF9AD484ADEBBF4FB48310F14841AE918A7350C378A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015BD717
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: af05eae3fafd642d212fbe6aa2c1aabee63d463d9a4bf1e39ea2e3b5be76b255
                                                              • Instruction ID: 02bad3fd8ea87e8bbf107d0dd1c517c346d3baacd2f8cd60f91a915d0d7a5806
                                                              • Opcode Fuzzy Hash: af05eae3fafd642d212fbe6aa2c1aabee63d463d9a4bf1e39ea2e3b5be76b255
                                                              • Instruction Fuzzy Hash: F721E0B5D00248DFDB10CFAAD584BDEBBF5FB48314F24841AE918A7250C378A944CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,015BB079,00000800,00000000,00000000), ref: 015BB28A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: b869ce3ef8bbbc55b4631daa8e4b9b23679f0dc3cfe80b611296abb70f3a7694
                                                              • Instruction ID: 9b2488606c07353eebe6fe8fd2b03084f721a69b4ae8bcf6e1935ac5eadb785b
                                                              • Opcode Fuzzy Hash: b869ce3ef8bbbc55b4631daa8e4b9b23679f0dc3cfe80b611296abb70f3a7694
                                                              • Instruction Fuzzy Hash: 2C1103B6C003489FDB24CF9AC484BDEFBF4EB48310F10842AE519AB200C3B5A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07335A96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: baac9ec45c820a85456c5d4df25fbb39afe1dfa6053f00b62435916c8cf4576d
                                                              • Instruction ID: 1e5b1eff7dc79b98ea0ffc9345afd1549f51053646ad0ec80081aeffc5578e7b
                                                              • Opcode Fuzzy Hash: baac9ec45c820a85456c5d4df25fbb39afe1dfa6053f00b62435916c8cf4576d
                                                              • Instruction Fuzzy Hash: A41144B6800349DFEB24DFA9C844BEEBBF5EF48310F14881AE529A7250C7799540DFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07335A96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: cfed75d3de89a8c0992a84da0af615c5249e99ecb7145f8b4a3f688d5fed2de6
                                                              • Instruction ID: 7f84d4005a0b49e1f108d3ae044e62ca1d5176cdc93624c6fd1ac27e79149e4f
                                                              • Opcode Fuzzy Hash: cfed75d3de89a8c0992a84da0af615c5249e99ecb7145f8b4a3f688d5fed2de6
                                                              • Instruction Fuzzy Hash: 9C1167728003499FDB24DFAAC844BDFBBF5EF48310F108819E519A7250CB759540CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,015BB079,00000800,00000000,00000000), ref: 015BB28A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: e217cd651f1463482af523b4ca6459094ead94cf61fc390bf51d8dd64a995d1b
                                                              • Instruction ID: 1b62abfa37e70ba370acf45ab694921c13e3f6f6d6dfae808d2dc81662658592
                                                              • Opcode Fuzzy Hash: e217cd651f1463482af523b4ca6459094ead94cf61fc390bf51d8dd64a995d1b
                                                              • Instruction Fuzzy Hash: 2F11DDB6C00209CFDB24CFAAC584BDEFBF5BB48310F10852AD519AB650C3B9A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: cde2e4e069f6fedcf737209969e895f9fe235ba17bab810369f9bba90208a647
                                                              • Instruction ID: c8da324b702e2be6bf7c7f26db47370d7edd7a77a637dea18b65784758707750
                                                              • Opcode Fuzzy Hash: cde2e4e069f6fedcf737209969e895f9fe235ba17bab810369f9bba90208a647
                                                              • Instruction Fuzzy Hash: 85113AB1D003488FDB24DFAAC4457DEFBF5EF48210F148419D519A7240DB79A544CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 1459c8bf471a704d4a6d7eee20343f14526aa81aeddff526f400c6f158985d35
                                                              • Instruction ID: 3ba5748e172cc0ad7608cd462de36df30618f8e2d08464d90c48d6b333df560e
                                                              • Opcode Fuzzy Hash: 1459c8bf471a704d4a6d7eee20343f14526aa81aeddff526f400c6f158985d35
                                                              • Instruction Fuzzy Hash: 501158B5D00349CFEB24DFAAC4457EEBBF4EF48210F14881AC519AB240DB799544CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0733A4AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 0157b6948562d8273647731dd019abb4e4a3196be0280fc4c908467916c33bd2
                                                              • Instruction ID: 09592b95c97a747019686861deb20443026018b3253f6068f5f9056b98d579da
                                                              • Opcode Fuzzy Hash: 0157b6948562d8273647731dd019abb4e4a3196be0280fc4c908467916c33bd2
                                                              • Instruction Fuzzy Hash: C411F2B5800359DFEB20DF9AC489BDEBBF8EB48320F108459E558A7310D375A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 015BAFFE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 4108d51122a932c7775f35ffcee8fc00404717d15b4c308d5413547f88b8714a
                                                              • Instruction ID: d7f0f8ffcae8490b7e13569df5f611c794afe680395467e69deec91f610700df
                                                              • Opcode Fuzzy Hash: 4108d51122a932c7775f35ffcee8fc00404717d15b4c308d5413547f88b8714a
                                                              • Instruction Fuzzy Hash: 6F1110B6C003498FDB24CF9AC484BDEFBF4EB88214F10841AD529AB210D379A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0733A4AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 3f60008387ab89df10ca3a14764a87dae55c7f9386148316995d930435759009
                                                              • Instruction ID: f093e092cd91cfd2c17242ba3e3c737b8b54e535a315d9de27dcfcf065c747d3
                                                              • Opcode Fuzzy Hash: 3f60008387ab89df10ca3a14764a87dae55c7f9386148316995d930435759009
                                                              • Instruction Fuzzy Hash: 3111F2B58003599FEB20DF9AD885BDEBBF8EB48320F108419E558A7300C375A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1225894115.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_126d000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0f391fbd3e850a117807fdb521fadc7b72a95818ccc0c8812feb644fe86690d1
                                                              • Instruction ID: 2d39da6994716dfb9753375d32979ebd937e2a5845d27baaeba5f61e2cdc63d6
                                                              • Opcode Fuzzy Hash: 0f391fbd3e850a117807fdb521fadc7b72a95818ccc0c8812feb644fe86690d1
                                                              • Instruction Fuzzy Hash: 6F21487661024CDFDB15DF54D9C0B56BB69FB88314F20C16CE9490F296C336E896CAA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1225953178.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_127d000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 93e125a77403c1b2a736872f3a9c599715f198d75e4040d67a9cf6f1ea1be2cd
                                                              • Instruction ID: 962103164ee46c59a2c655daf7ce1fd9792b2142dea6dfb37e1a023305df3892
                                                              • Opcode Fuzzy Hash: 93e125a77403c1b2a736872f3a9c599715f198d75e4040d67a9cf6f1ea1be2cd
                                                              • Instruction Fuzzy Hash: 7A210075614208EFDB16DF64D980B27BB61EF84314F20C56DE90A0B292C376D807CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1225953178.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_127d000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a636c35b337f732b2861d8a029934b4401f1d046425cb8f1427df6e235fa38f
                                                              • Instruction ID: 022db83783cb2be6fa361bcdb6401f9babe0da4ff47b05be8a4a9c1400d1af6c
                                                              • Opcode Fuzzy Hash: 7a636c35b337f732b2861d8a029934b4401f1d046425cb8f1427df6e235fa38f
                                                              • Instruction Fuzzy Hash: DF219A755093848FCB03CF24D990712BF71AF46314F28C5EAD9498B6A3C33A980ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1225894115.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_126d000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                              • Instruction ID: 2a37b4ef260ee310cdd6121353056d3e2caf087b190ce9363d51b77dac646249
                                                              • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                              • Instruction Fuzzy Hash: 791121B2500288DFCB02CF44D5C0B56BF71FB84320F24C2A9D9490B697C33AE856CBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 206401273e458cc43961796b343c54a40604e6f4ea0b4a6d27094be9c50c3d38
                                                              • Instruction ID: 08f5c0ae3e5d55486f514c65371ff86f8d31e10fdef240d1c186fa89cc29572b
                                                              • Opcode Fuzzy Hash: 206401273e458cc43961796b343c54a40604e6f4ea0b4a6d27094be9c50c3d38
                                                              • Instruction Fuzzy Hash: 55E11EB4E002598FDB24DF99C580AAEFBB2FF89305F24C159D819AB355D7309941CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3843bc3e88efbdf819dfa19eca773d1342b6c1d6b518210f23db774c2840356c
                                                              • Instruction ID: 52aa59aa73408aef33127e1f41f875b33e31b41db96e9f92d678ae845e872431
                                                              • Opcode Fuzzy Hash: 3843bc3e88efbdf819dfa19eca773d1342b6c1d6b518210f23db774c2840356c
                                                              • Instruction Fuzzy Hash: 49E11DB4E102598FDB24DFA9C580AAEFBF2FF89305F248169D819AB355D7309941CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 747b2357a2e32c643b0eaad96c373eac0d74ec15bde97b87cb7b7a1be023120a
                                                              • Instruction ID: 78ba2a80d385714e32839d9aec86f87bd26df1ab48214cb6016f9b35240aefcb
                                                              • Opcode Fuzzy Hash: 747b2357a2e32c643b0eaad96c373eac0d74ec15bde97b87cb7b7a1be023120a
                                                              • Instruction Fuzzy Hash: F5E1FCB4E002598FDB24DF99C580AAEFBB2FF89305F24C159D818AB355D731A941CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8107b01448b82d2c778837e109b65d7f79bd91092c360cdc371070ec9b4e5026
                                                              • Instruction ID: 4705b34e60be602b49f867abe4b4e53a417122183ad6e9f76cd39b06e0e5ac69
                                                              • Opcode Fuzzy Hash: 8107b01448b82d2c778837e109b65d7f79bd91092c360cdc371070ec9b4e5026
                                                              • Instruction Fuzzy Hash: 44E110B4E002598FDB24DFA9C580AAEFBF2FF89305F248159D819AB355D731A941CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 012285dfeb60aaf0c7083c793de72d635d14dc628722f506e4175eb2e81b9622
                                                              • Instruction ID: 389b8bdd0b2d2c74e94493b2b6c51eeff942eb6da7a00eac696843a1bc3a2246
                                                              • Opcode Fuzzy Hash: 012285dfeb60aaf0c7083c793de72d635d14dc628722f506e4175eb2e81b9622
                                                              • Instruction Fuzzy Hash: D8E10CB4E002598FDB24DF99C590AAEFBB2FF89305F24C169D858AB355D7309941CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1226380367.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_15b0000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 861f2ae666271b33334464bf13c69c4eb95c349b3ddde8a702fbab01c949daa4
                                                              • Instruction ID: fd93b46494856cb1b7115270a7a62bf92f71d36f435961276678903156eb39cd
                                                              • Opcode Fuzzy Hash: 861f2ae666271b33334464bf13c69c4eb95c349b3ddde8a702fbab01c949daa4
                                                              • Instruction Fuzzy Hash: 52A13C36E0021A8FCF05DFB8C8845DEBBB2FF85304B15856AE905AF265DB71E955CB40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b7ec6201e3153ca44c3f16dbd3e694bf373ca68aea1a801ed87e3e0618a923f
                                                              • Instruction ID: f232665ff676149416ea85ece6fc787aba1247b1baa7cdc92857e842b42d0037
                                                              • Opcode Fuzzy Hash: 2b7ec6201e3153ca44c3f16dbd3e694bf373ca68aea1a801ed87e3e0618a923f
                                                              • Instruction Fuzzy Hash: 6251E3B4E19209CFEB14CF9AD8449EEBBFABF8A311F149026E419B7215D7709941CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fe9784d23ccdb98040c00b495cdae84f972dabf00fda48486768c7155c336a55
                                                              • Instruction ID: 50ce7d0d1d2be25169c0c9544d690581f214d6846bb64f6dc76a55ebb99a8265
                                                              • Opcode Fuzzy Hash: fe9784d23ccdb98040c00b495cdae84f972dabf00fda48486768c7155c336a55
                                                              • Instruction Fuzzy Hash: 7F513DB0E042598FDB14DFA9C5409AEFBF2FF89304F14C16AD818AB216D7359941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1231639994.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7330000_Shipping Docs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 382bceefa11baf864c609aa9601cb66f2b19e5a926787e7133214c2d7abd2acb
                                                              • Instruction ID: db25d46d4dc4465342c77e0bd4110a5b192983177b9b20ee01b14b975100bd01
                                                              • Opcode Fuzzy Hash: 382bceefa11baf864c609aa9601cb66f2b19e5a926787e7133214c2d7abd2acb
                                                              • Instruction Fuzzy Hash: B1511EB4E002598FDB14DFA9C5405AEFBF2BF89305F24C16AD818AB315D7319941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:10.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:6
                                                              Total number of Limit Nodes:0
                                                              execution_graph 24964 642e5e0 24965 642e626 GlobalMemoryStatusEx 24964->24965 24966 642e656 24965->24966 24967 2d57350 24968 2d57396 DeleteFileW 24967->24968 24970 2d573cf 24968->24970

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2444 2d57348-2d5739a 2447 2d573a2-2d573cd DeleteFileW 2444->2447 2448 2d5739c-2d5739f 2444->2448 2449 2d573d6-2d573fe 2447->2449 2450 2d573cf-2d573d5 2447->2450 2448->2447 2450->2449
                                                              APIs
                                                              • DeleteFileW.KERNELBASE(00000000), ref: 02D573C0
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.1245325293.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_2d50000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DeleteFile
                                                              • String ID:
                                                              • API String ID: 4033686569-0
                                                              • Opcode ID: e4085841388cd704ddce7deaacb289eb615b62cc450a9155d4a1beb5443063aa
                                                              • Instruction ID: 8ac7b6ed196983f79f5d67467b716eb9926c42ab1c1ce38a473ea464ec8c51e0
                                                              • Opcode Fuzzy Hash: e4085841388cd704ddce7deaacb289eb615b62cc450a9155d4a1beb5443063aa
                                                              • Instruction Fuzzy Hash: 072134B1D0062A9FDB14CF9AC545B9EFBB4BB48320F10812AD858A7740D778A940CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2453 2d57350-2d5739a 2455 2d573a2-2d573cd DeleteFileW 2453->2455 2456 2d5739c-2d5739f 2453->2456 2457 2d573d6-2d573fe 2455->2457 2458 2d573cf-2d573d5 2455->2458 2456->2455 2458->2457
                                                              APIs
                                                              • DeleteFileW.KERNELBASE(00000000), ref: 02D573C0
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.1245325293.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_2d50000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DeleteFile
                                                              • String ID:
                                                              • API String ID: 4033686569-0
                                                              • Opcode ID: b4af6b7c3a798fc4d2bbe47c46f21733011a83d0a118eb815e083a552c044c13
                                                              • Instruction ID: 698ce9c38a1a5c124cd55dbb22ad6ae960ed6325c204bbfbd61869d7bb36b3b3
                                                              • Opcode Fuzzy Hash: b4af6b7c3a798fc4d2bbe47c46f21733011a83d0a118eb815e083a552c044c13
                                                              • Instruction Fuzzy Hash: 811124B1C006699BDB24CF9AC545B9EFBF4BB48220F10812AD868A7740D778A940CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 0642E647
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.1249736257.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6420000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: 40beca4fc80545e008db3179828ada46fa22151e6378d7e5d80de3ec723d8959
                                                              • Instruction ID: 669d1f2f4fafa3f22e736c3e6e258bdaf1c6f2236e363ebf6b0e584eb55ceed9
                                                              • Opcode Fuzzy Hash: 40beca4fc80545e008db3179828ada46fa22151e6378d7e5d80de3ec723d8959
                                                              • Instruction Fuzzy Hash: EF1114B5C0065A9FDB20CF9AC444BDEFBF4EF48210F14812AD918A7740D378A941CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 0642E647
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.1249736257.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6420000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: ae019e7a4ce4344d9362687b83e319ebf3eeec234fbd612f2066eee0a696ae17
                                                              • Instruction ID: bf67a9e5b32d4e96b3554ab6ddb1be5d591883a9d4fcbd3fa756fd08a67b27de
                                                              • Opcode Fuzzy Hash: ae019e7a4ce4344d9362687b83e319ebf3eeec234fbd612f2066eee0a696ae17
                                                              • Instruction Fuzzy Hash: 6711E4B1C0065A9FDB10CF9AC444BDEFBF4AB48210F15812AD918A7640D778A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:11.3%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:262
                                                              Total number of Limit Nodes:19
                                                              execution_graph 26615 e3d751 26616 e3d714 DuplicateHandle 26615->26616 26618 e3d75a 26615->26618 26617 e3d726 26616->26617 26582 e3acb0 26585 e3ada8 26582->26585 26583 e3acbf 26586 e3adb9 26585->26586 26587 e3addc 26585->26587 26586->26587 26593 e3b037 26586->26593 26597 e3b040 26586->26597 26587->26583 26588 e3afe0 GetModuleHandleW 26590 e3b00d 26588->26590 26589 e3add4 26589->26587 26589->26588 26590->26583 26594 e3b03f 26593->26594 26596 e3b079 26594->26596 26601 e3a130 26594->26601 26596->26589 26598 e3b054 26597->26598 26599 e3b079 26598->26599 26600 e3a130 LoadLibraryExW 26598->26600 26599->26589 26600->26599 26602 e3b220 LoadLibraryExW 26601->26602 26604 e3b299 26602->26604 26604->26596 26605 e3d040 26606 e3d086 GetCurrentProcess 26605->26606 26608 e3d0d8 GetCurrentThread 26606->26608 26611 e3d0d1 26606->26611 26609 e3d115 GetCurrentProcess 26608->26609 26610 e3d10e 26608->26610 26612 e3d14b 26609->26612 26610->26609 26611->26608 26613 e3d173 GetCurrentThreadId 26612->26613 26614 e3d1a4 26613->26614 26296 6da9490 26297 6da961b 26296->26297 26299 6da94b6 26296->26299 26299->26297 26300 6da5e6c 26299->26300 26301 6da9710 PostMessageW 26300->26301 26302 6da977c 26301->26302 26302->26299 26303 e34668 26304 e3467a 26303->26304 26305 e34686 26304->26305 26307 e3477f 26304->26307 26308 e34787 26307->26308 26312 e34888 26308->26312 26316 e34878 26308->26316 26314 e348af 26312->26314 26313 e3498c 26313->26313 26314->26313 26320 e344b0 26314->26320 26317 e3487f 26316->26317 26318 e3498c 26317->26318 26319 e344b0 CreateActCtxA 26317->26319 26319->26318 26321 e35918 CreateActCtxA 26320->26321 26323 e359db 26321->26323 26324 6da6855 26325 6da680a 26324->26325 26326 6da67ac 26325->26326 26331 6da8258 26325->26331 26354 6da82ce 26325->26354 26378 6da81d9 26325->26378 26402 6da8268 26325->26402 26332 6da825c 26331->26332 26425 6da889f 26332->26425 26430 6da871e 26332->26430 26435 6da8b1e 26332->26435 26440 6da8686 26332->26440 26445 6da8861 26332->26445 26450 6da8aa0 26332->26450 26455 6da8a8d 26332->26455 26464 6da8d4c 26332->26464 26469 6da894c 26332->26469 26474 6da89cf 26332->26474 26479 6da878e 26332->26479 26485 6da8b8e 26332->26485 26493 6da898b 26332->26493 26500 6da8f8a 26332->26500 26504 6da8794 26332->26504 26510 6da8a54 26332->26510 26514 6da86b1 26332->26514 26519 6da87f1 26332->26519 26524 6da8830 26332->26524 26529 6da88b3 26332->26529 26333 6da828a 26333->26326 26355 6da825c 26354->26355 26357 6da82d1 26354->26357 26358 6da8b1e 2 API calls 26355->26358 26359 6da871e 2 API calls 26355->26359 26360 6da889f 2 API calls 26355->26360 26361 6da88b3 2 API calls 26355->26361 26362 6da8830 2 API calls 26355->26362 26363 6da87f1 2 API calls 26355->26363 26364 6da86b1 2 API calls 26355->26364 26365 6da8a54 2 API calls 26355->26365 26366 6da8794 2 API calls 26355->26366 26367 6da8f8a 2 API calls 26355->26367 26368 6da898b 4 API calls 26355->26368 26369 6da8b8e 4 API calls 26355->26369 26370 6da878e 2 API calls 26355->26370 26371 6da89cf 2 API calls 26355->26371 26372 6da894c 2 API calls 26355->26372 26373 6da8d4c 2 API calls 26355->26373 26374 6da8a8d 4 API calls 26355->26374 26375 6da8aa0 2 API calls 26355->26375 26376 6da8861 2 API calls 26355->26376 26377 6da8686 2 API calls 26355->26377 26356 6da828a 26356->26326 26357->26326 26358->26356 26359->26356 26360->26356 26361->26356 26362->26356 26363->26356 26364->26356 26365->26356 26366->26356 26367->26356 26368->26356 26369->26356 26370->26356 26371->26356 26372->26356 26373->26356 26374->26356 26375->26356 26376->26356 26377->26356 26379 6da81fd 26378->26379 26380 6da8257 26378->26380 26379->26326 26382 6da8b1e 2 API calls 26380->26382 26383 6da871e 2 API calls 26380->26383 26384 6da889f 2 API calls 26380->26384 26385 6da88b3 2 API calls 26380->26385 26386 6da8830 2 API calls 26380->26386 26387 6da87f1 2 API calls 26380->26387 26388 6da86b1 2 API calls 26380->26388 26389 6da8a54 2 API calls 26380->26389 26390 6da8794 2 API calls 26380->26390 26391 6da8f8a 2 API calls 26380->26391 26392 6da898b 4 API calls 26380->26392 26393 6da8b8e 4 API calls 26380->26393 26394 6da878e 2 API calls 26380->26394 26395 6da89cf 2 API calls 26380->26395 26396 6da894c 2 API calls 26380->26396 26397 6da8d4c 2 API calls 26380->26397 26398 6da8a8d 4 API calls 26380->26398 26399 6da8aa0 2 API calls 26380->26399 26400 6da8861 2 API calls 26380->26400 26401 6da8686 2 API calls 26380->26401 26381 6da828a 26381->26326 26382->26381 26383->26381 26384->26381 26385->26381 26386->26381 26387->26381 26388->26381 26389->26381 26390->26381 26391->26381 26392->26381 26393->26381 26394->26381 26395->26381 26396->26381 26397->26381 26398->26381 26399->26381 26400->26381 26401->26381 26403 6da8282 26402->26403 26405 6da8b1e 2 API calls 26403->26405 26406 6da871e 2 API calls 26403->26406 26407 6da889f 2 API calls 26403->26407 26408 6da88b3 2 API calls 26403->26408 26409 6da8830 2 API calls 26403->26409 26410 6da87f1 2 API calls 26403->26410 26411 6da86b1 2 API calls 26403->26411 26412 6da8a54 2 API calls 26403->26412 26413 6da8794 2 API calls 26403->26413 26414 6da8f8a 2 API calls 26403->26414 26415 6da898b 4 API calls 26403->26415 26416 6da8b8e 4 API calls 26403->26416 26417 6da878e 2 API calls 26403->26417 26418 6da89cf 2 API calls 26403->26418 26419 6da894c 2 API calls 26403->26419 26420 6da8d4c 2 API calls 26403->26420 26421 6da8a8d 4 API calls 26403->26421 26422 6da8aa0 2 API calls 26403->26422 26423 6da8861 2 API calls 26403->26423 26424 6da8686 2 API calls 26403->26424 26404 6da828a 26404->26326 26405->26404 26406->26404 26407->26404 26408->26404 26409->26404 26410->26404 26411->26404 26412->26404 26413->26404 26414->26404 26415->26404 26416->26404 26417->26404 26418->26404 26419->26404 26420->26404 26421->26404 26422->26404 26423->26404 26424->26404 26426 6da88ac 26425->26426 26534 6da5ae8 26426->26534 26538 6da5ae0 26426->26538 26427 6da9194 26431 6da8694 26430->26431 26542 6da6170 26431->26542 26546 6da6165 26431->26546 26436 6da8b41 26435->26436 26438 6da5ae8 WriteProcessMemory 26436->26438 26439 6da5ae0 WriteProcessMemory 26436->26439 26437 6da8c9e 26437->26333 26438->26437 26439->26437 26441 6da86b9 26440->26441 26443 6da6170 CreateProcessA 26441->26443 26444 6da6165 CreateProcessA 26441->26444 26442 6da87d2 26442->26333 26443->26442 26444->26442 26446 6da888a 26445->26446 26447 6da8fac 26446->26447 26550 6da5a28 26446->26550 26554 6da5a20 26446->26554 26451 6da884b 26450->26451 26452 6da9066 26451->26452 26558 6da5029 26451->26558 26562 6da5030 26451->26562 26456 6da8a53 26455->26456 26459 6da896a 26455->26459 26566 6da50d8 26456->26566 26570 6da50e0 26456->26570 26457 6da91d6 26458 6da8a6e 26458->26333 26459->26457 26574 6da5bd8 26459->26574 26578 6da5bd0 26459->26578 26466 6da87fd 26464->26466 26465 6da9066 26466->26465 26467 6da5029 ResumeThread 26466->26467 26468 6da5030 ResumeThread 26466->26468 26467->26466 26468->26466 26470 6da8952 26469->26470 26472 6da5bd8 ReadProcessMemory 26470->26472 26473 6da5bd0 ReadProcessMemory 26470->26473 26471 6da9009 26471->26333 26472->26471 26473->26471 26475 6da89f8 26474->26475 26476 6da9066 26475->26476 26477 6da5029 ResumeThread 26475->26477 26478 6da5030 ResumeThread 26475->26478 26477->26475 26478->26475 26481 6da8694 26479->26481 26480 6da8772 26480->26333 26481->26480 26483 6da6170 CreateProcessA 26481->26483 26484 6da6165 CreateProcessA 26481->26484 26482 6da87d2 26482->26333 26483->26482 26484->26482 26486 6da8b9b 26485->26486 26488 6da87fd 26486->26488 26489 6da50d8 Wow64SetThreadContext 26486->26489 26490 6da50e0 Wow64SetThreadContext 26486->26490 26487 6da9066 26488->26487 26491 6da5029 ResumeThread 26488->26491 26492 6da5030 ResumeThread 26488->26492 26489->26486 26490->26486 26491->26488 26492->26488 26496 6da5ae8 WriteProcessMemory 26493->26496 26497 6da5ae0 WriteProcessMemory 26493->26497 26494 6da9066 26494->26333 26495 6da87fd 26495->26494 26498 6da5029 ResumeThread 26495->26498 26499 6da5030 ResumeThread 26495->26499 26496->26495 26497->26495 26498->26495 26499->26495 26502 6da5a28 VirtualAllocEx 26500->26502 26503 6da5a20 VirtualAllocEx 26500->26503 26501 6da8fac 26502->26501 26503->26501 26507 6da8694 26504->26507 26505 6da8772 26505->26333 26506 6da87d2 26506->26333 26507->26505 26508 6da6170 CreateProcessA 26507->26508 26509 6da6165 CreateProcessA 26507->26509 26508->26506 26509->26506 26512 6da50d8 Wow64SetThreadContext 26510->26512 26513 6da50e0 Wow64SetThreadContext 26510->26513 26511 6da8a6e 26511->26333 26512->26511 26513->26511 26515 6da86c3 26514->26515 26517 6da6170 CreateProcessA 26515->26517 26518 6da6165 CreateProcessA 26515->26518 26516 6da87d2 26516->26333 26517->26516 26518->26516 26521 6da87fd 26519->26521 26520 6da9066 26521->26520 26522 6da5029 ResumeThread 26521->26522 26523 6da5030 ResumeThread 26521->26523 26522->26521 26523->26521 26525 6da883a 26524->26525 26526 6da9066 26525->26526 26527 6da5029 ResumeThread 26525->26527 26528 6da5030 ResumeThread 26525->26528 26527->26525 26528->26525 26531 6da87fd 26529->26531 26530 6da9066 26531->26530 26532 6da5029 ResumeThread 26531->26532 26533 6da5030 ResumeThread 26531->26533 26532->26531 26533->26531 26535 6da5b30 WriteProcessMemory 26534->26535 26537 6da5b87 26535->26537 26537->26427 26539 6da5ae6 WriteProcessMemory 26538->26539 26541 6da5b87 26539->26541 26541->26427 26543 6da61f9 26542->26543 26543->26543 26544 6da635e CreateProcessA 26543->26544 26545 6da63bb 26544->26545 26547 6da6170 CreateProcessA 26546->26547 26549 6da63bb 26547->26549 26551 6da5a68 VirtualAllocEx 26550->26551 26553 6da5aa5 26551->26553 26553->26447 26555 6da5a28 VirtualAllocEx 26554->26555 26557 6da5aa5 26555->26557 26557->26447 26559 6da5070 ResumeThread 26558->26559 26561 6da50a1 26559->26561 26561->26451 26563 6da5070 ResumeThread 26562->26563 26565 6da50a1 26563->26565 26565->26451 26567 6da50e0 Wow64SetThreadContext 26566->26567 26569 6da516d 26567->26569 26569->26458 26571 6da5125 Wow64SetThreadContext 26570->26571 26573 6da516d 26571->26573 26573->26458 26575 6da5c23 ReadProcessMemory 26574->26575 26577 6da5c67 26575->26577 26577->26458 26579 6da5bd8 ReadProcessMemory 26578->26579 26581 6da5c67 26579->26581 26581->26458

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 527 e3d040-e3d0cf GetCurrentProcess 531 e3d0d1-e3d0d7 527->531 532 e3d0d8-e3d10c GetCurrentThread 527->532 531->532 533 e3d115-e3d149 GetCurrentProcess 532->533 534 e3d10e-e3d114 532->534 536 e3d152-e3d16d call e3d61f 533->536 537 e3d14b-e3d151 533->537 534->533 540 e3d173-e3d1a2 GetCurrentThreadId 536->540 537->536 541 e3d1a4-e3d1aa 540->541 542 e3d1ab-e3d20d 540->542 541->542
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 00E3D0BE
                                                              • GetCurrentThread.KERNEL32 ref: 00E3D0FB
                                                              • GetCurrentProcess.KERNEL32 ref: 00E3D138
                                                              • GetCurrentThreadId.KERNEL32 ref: 00E3D191
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 70999db6d694f264648d30bedb0163e0fa4d795556b97a167e1b2f8f12174237
                                                              • Instruction ID: cca87721756bde0e86d87c50b5bbea1ac569c9707edbd779b2fba51f2e410668
                                                              • Opcode Fuzzy Hash: 70999db6d694f264648d30bedb0163e0fa4d795556b97a167e1b2f8f12174237
                                                              • Instruction Fuzzy Hash: D75159B0901649CFEB14CFAAD9487DEBBF1EF88304F208419E419BB3A1D7745944CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 657 e344b0-e359d9 CreateActCtxA 660 e359e2-e35a3c 657->660 661 e359db-e359e1 657->661 668 e35a4b-e35a4f 660->668 669 e35a3e-e35a41 660->669 661->660 670 e35a51-e35a5d 668->670 671 e35a60 668->671 669->668 670->671 673 e35a61 671->673 673->673
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID: Xm
                                                              • API String ID: 2289755597-1933489682
                                                              • Opcode ID: 4154738fc87ec53a502dfadc32de0e2ca17ebc910d7a860a75d40c294f8d421a
                                                              • Instruction ID: 38e42522b889f5c21d5682f9503ab61388a61ed34fcd5080698eb87162fe1229
                                                              • Opcode Fuzzy Hash: 4154738fc87ec53a502dfadc32de0e2ca17ebc910d7a860a75d40c294f8d421a
                                                              • Instruction Fuzzy Hash: 1A41EF71C00718CBEB24DFA9C885B8DBBB5BF89304F20806AD418AB251DB756946CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 674 e3590d-e35913 676 e3591c-e359d9 CreateActCtxA 674->676 678 e359e2-e35a3c 676->678 679 e359db-e359e1 676->679 686 e35a4b-e35a4f 678->686 687 e35a3e-e35a41 678->687 679->678 688 e35a51-e35a5d 686->688 689 e35a60 686->689 687->686 688->689 691 e35a61 689->691 691->691
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID: Xm
                                                              • API String ID: 2289755597-1933489682
                                                              • Opcode ID: 1237b3906b4e818a37537a53e82726a666a01a9b42bb67a88b3211b7576e7edc
                                                              • Instruction ID: 493ad73ee8438541776fa9d2ee386e8c960665b500529be84be9080015caca3f
                                                              • Opcode Fuzzy Hash: 1237b3906b4e818a37537a53e82726a666a01a9b42bb67a88b3211b7576e7edc
                                                              • Instruction Fuzzy Hash: 9341CFB1C00719CFEB24DFA9C88478DBBB5BF89304F20815AD418BB2A5DB755946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 692 6da5ae0-6da5ae4 693 6da5b2c-6da5b36 692->693 694 6da5ae6-6da5b36 692->694 696 6da5b38-6da5b44 693->696 697 6da5b46-6da5b85 WriteProcessMemory 693->697 694->696 694->697 696->697 700 6da5b8e-6da5bbe 697->700 701 6da5b87-6da5b8d 697->701 701->700
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06DA5B78
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID: }
                                                              • API String ID: 3559483778-4239843852
                                                              • Opcode ID: 31dbc3243834db79c7ec3a7b14da1d3609e4e60ab5f8a6cfd12262ddbcbbe094
                                                              • Instruction ID: 9849fe4adaff7a5aae156820caeebc5c03ceb2144339bd535bc4967ec742174b
                                                              • Opcode Fuzzy Hash: 31dbc3243834db79c7ec3a7b14da1d3609e4e60ab5f8a6cfd12262ddbcbbe094
                                                              • Instruction Fuzzy Hash: BC3145719003499FDB10CFAAC880BDEBBF1FF48310F10852AE968A7251C7799944CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 705 e3a130-e3b260 707 e3b262-e3b265 705->707 708 e3b268-e3b297 LoadLibraryExW 705->708 707->708 709 e3b2a0-e3b2bd 708->709 710 e3b299-e3b29f 708->710 710->709
                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E3B079,00000800,00000000,00000000), ref: 00E3B28A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: D]
                                                              • API String ID: 1029625771-637875248
                                                              • Opcode ID: b0e0426ec149fdb22b916b0029829b8659ba19ad81750c730879b2aa204715c7
                                                              • Instruction ID: 5e26602ae2e5e3fefc4c74064c8b82f466a8eb6a185cc21da7e7c8d0dbc0a567
                                                              • Opcode Fuzzy Hash: b0e0426ec149fdb22b916b0029829b8659ba19ad81750c730879b2aa204715c7
                                                              • Instruction Fuzzy Hash: A111D6B6D002499FDB10CF9AD448BDEFBF4EB48310F10852AD519BB650C379A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 713 6da5e6c-6da977a PostMessageW 715 6da977c-6da9782 713->715 716 6da9783-6da9797 713->716 715->716
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06DA976D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID: ld
                                                              • API String ID: 410705778-1519904734
                                                              • Opcode ID: f23a5deb861ad2f35c41c010f0f8960e9cbc6d9baccf467cbdd24f4bdccfc65b
                                                              • Instruction ID: eda83391d3cafa7f0b5813927a0c29b35b89c1ced51acf82a81b66bad64f49f7
                                                              • Opcode Fuzzy Hash: f23a5deb861ad2f35c41c010f0f8960e9cbc6d9baccf467cbdd24f4bdccfc65b
                                                              • Instruction Fuzzy Hash: 8611F5B5C04348DFDB10DF9AC485BDEBBF8EB48310F108419E568A7251C375A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 718 6d3f4a0-6d3f4c3 719 6d3f4c5 718->719 720 6d3f4ca-6d3f61c call 6d3fc58 call 6d3f478 718->720 719->720 735 6d3f622 720->735 736 6d3f515-6d3f51a 720->736 740 6d3f628-6d3f62c 735->740 737 6d3f57e-6d3f632 736->737 738 6d3f51c-6d3f51d 736->738 737->740 738->737 742 6d3f62e-6d3f6a4 740->742 743 6d3f5bc-6d3f5d1 740->743 754 6d3f6a6 call 6da07a9 742->754 755 6d3f6a6 call 6da04f9 742->755 756 6d3f6a6 call 6da04df 742->756 757 6d3f6a6 call 6da0b6c 742->757 758 6d3f6a6 call 6da07b2 742->758 759 6d3f6a6 call 6da0543 742->759 760 6d3f6a6 call 6da09f3 742->760 761 6d3f6a6 call 6da05c6 742->761 762 6d3f6a6 call 6da0786 742->762 763 6d3f6a6 call 6da0676 742->763 764 6d3f6a6 call 6da0617 742->764 765 6d3f6a6 call 6da0c24 742->765 743->740 753 6d3f6ac-6d3f6b6 754->753 755->753 756->753 757->753 758->753 759->753 760->753 761->753 762->753 763->753 764->753 765->753
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Teq$Teq
                                                              • API String ID: 0-2938103587
                                                              • Opcode ID: 9c44b7f67ef317031932704f72689fe2056a3e51bc0af3997bd17b5a5230db6c
                                                              • Instruction ID: 4f6154c8f450edccdf14ce12bf7c958bcc1edeb837ca435c80307c88735af03b
                                                              • Opcode Fuzzy Hash: 9c44b7f67ef317031932704f72689fe2056a3e51bc0af3997bd17b5a5230db6c
                                                              • Instruction Fuzzy Hash: B761C574E0521C8FDB48CFA9C9446EDBBB6FF89300F14902AE419AB365DB749905CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 780 6da6165-6da6205 783 6da623e-6da625e 780->783 784 6da6207-6da6211 780->784 789 6da6260-6da626a 783->789 790 6da6297-6da62c6 783->790 784->783 785 6da6213-6da6215 784->785 787 6da6238-6da623b 785->787 788 6da6217-6da6221 785->788 787->783 791 6da6223 788->791 792 6da6225-6da6234 788->792 789->790 793 6da626c-6da626e 789->793 800 6da62c8-6da62d2 790->800 801 6da62ff-6da63b9 CreateProcessA 790->801 791->792 792->792 794 6da6236 792->794 795 6da6270-6da627a 793->795 796 6da6291-6da6294 793->796 794->787 798 6da627e-6da628d 795->798 799 6da627c 795->799 796->790 798->798 802 6da628f 798->802 799->798 800->801 803 6da62d4-6da62d6 800->803 812 6da63bb-6da63c1 801->812 813 6da63c2-6da6448 801->813 802->796 805 6da62d8-6da62e2 803->805 806 6da62f9-6da62fc 803->806 807 6da62e6-6da62f5 805->807 808 6da62e4 805->808 806->801 807->807 809 6da62f7 807->809 808->807 809->806 812->813 823 6da644a-6da644e 813->823 824 6da6458-6da645c 813->824 823->824 825 6da6450 823->825 826 6da645e-6da6462 824->826 827 6da646c-6da6470 824->827 825->824 826->827 828 6da6464 826->828 829 6da6472-6da6476 827->829 830 6da6480-6da6484 827->830 828->827 829->830 833 6da6478 829->833 831 6da6496-6da649d 830->831 832 6da6486-6da648c 830->832 834 6da649f-6da64ae 831->834 835 6da64b4 831->835 832->831 833->830 834->835 837 6da64b5 835->837 837->837
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06DA63A6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: db3528c42f72058fca8ea4b119efa2f7fa9ba61951566a52b15b6bb4e6fbdfd6
                                                              • Instruction ID: 1c91b8be433198d547369a3f2d467f312a7e615c21d13f5cbca7a145a29b216a
                                                              • Opcode Fuzzy Hash: db3528c42f72058fca8ea4b119efa2f7fa9ba61951566a52b15b6bb4e6fbdfd6
                                                              • Instruction Fuzzy Hash: 1CA16C71D04359CFEB64CFA8C841BDDBBB2BF49310F188569E858A7280DB749985CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 838 6da6170-6da6205 840 6da623e-6da625e 838->840 841 6da6207-6da6211 838->841 846 6da6260-6da626a 840->846 847 6da6297-6da62c6 840->847 841->840 842 6da6213-6da6215 841->842 844 6da6238-6da623b 842->844 845 6da6217-6da6221 842->845 844->840 848 6da6223 845->848 849 6da6225-6da6234 845->849 846->847 850 6da626c-6da626e 846->850 857 6da62c8-6da62d2 847->857 858 6da62ff-6da63b9 CreateProcessA 847->858 848->849 849->849 851 6da6236 849->851 852 6da6270-6da627a 850->852 853 6da6291-6da6294 850->853 851->844 855 6da627e-6da628d 852->855 856 6da627c 852->856 853->847 855->855 859 6da628f 855->859 856->855 857->858 860 6da62d4-6da62d6 857->860 869 6da63bb-6da63c1 858->869 870 6da63c2-6da6448 858->870 859->853 862 6da62d8-6da62e2 860->862 863 6da62f9-6da62fc 860->863 864 6da62e6-6da62f5 862->864 865 6da62e4 862->865 863->858 864->864 866 6da62f7 864->866 865->864 866->863 869->870 880 6da644a-6da644e 870->880 881 6da6458-6da645c 870->881 880->881 882 6da6450 880->882 883 6da645e-6da6462 881->883 884 6da646c-6da6470 881->884 882->881 883->884 885 6da6464 883->885 886 6da6472-6da6476 884->886 887 6da6480-6da6484 884->887 885->884 886->887 890 6da6478 886->890 888 6da6496-6da649d 887->888 889 6da6486-6da648c 887->889 891 6da649f-6da64ae 888->891 892 6da64b4 888->892 889->888 890->887 891->892 894 6da64b5 892->894 894->894
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06DA63A6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: d8a886e8d274cfc4d7a49a82bda2f71725e67d7f6a4fd87f4bc8f3c911e3e205
                                                              • Instruction ID: c760e29799e9b4da4e1331b165c416f765ea6c88ede47dfa1768a2af2c3e9e1f
                                                              • Opcode Fuzzy Hash: d8a886e8d274cfc4d7a49a82bda2f71725e67d7f6a4fd87f4bc8f3c911e3e205
                                                              • Instruction Fuzzy Hash: 5C914B71D04359CFEB64CFA8C841BEDBBB2BF48310F188569E818A7280DB759985CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 895 e3ada8-e3adb7 896 e3ade3-e3ade7 895->896 897 e3adb9-e3adc6 call e3a0cc 895->897 898 e3adfb-e3ae3c 896->898 899 e3ade9-e3adf3 896->899 904 e3adc8 897->904 905 e3addc 897->905 906 e3ae49-e3ae57 898->906 907 e3ae3e-e3ae46 898->907 899->898 951 e3adce call e3b040 904->951 952 e3adce call e3b037 904->952 905->896 909 e3ae7b-e3ae7d 906->909 910 e3ae59-e3ae5e 906->910 907->906 908 e3add4-e3add6 908->905 911 e3af18-e3afd8 908->911 912 e3ae80-e3ae87 909->912 913 e3ae60-e3ae67 call e3a0d8 910->913 914 e3ae69 910->914 946 e3afe0-e3b00b GetModuleHandleW 911->946 947 e3afda-e3afdd 911->947 916 e3ae94-e3ae9b 912->916 917 e3ae89-e3ae91 912->917 915 e3ae6b-e3ae79 913->915 914->915 915->912 920 e3aea8-e3aeaa call e3a0e8 916->920 921 e3ae9d-e3aea5 916->921 917->916 924 e3aeaf-e3aeb1 920->924 921->920 926 e3aeb3-e3aebb 924->926 927 e3aebe-e3aec3 924->927 926->927 928 e3aee1-e3aeee 927->928 929 e3aec5-e3aecc 927->929 936 e3af11-e3af17 928->936 937 e3aef0-e3af0e 928->937 929->928 931 e3aece-e3aede call e3a0f8 call e3a108 929->931 931->928 937->936 948 e3b014-e3b028 946->948 949 e3b00d-e3b013 946->949 947->946 949->948 951->908 952->908
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3AFFE
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 82b9ac227c5c13d9f16f31d9a46bca4b671da80c7b26f8075d8378c61578876e
                                                              • Instruction ID: 51ef4f4fc1245e157856a3d7da0a814b03094e4ebcc5c71866962d6c55aefd9a
                                                              • Opcode Fuzzy Hash: 82b9ac227c5c13d9f16f31d9a46bca4b671da80c7b26f8075d8378c61578876e
                                                              • Instruction Fuzzy Hash: E0714970A00B058FDB24DF2AD44575ABBF1FF88304F048A2ED496EBA50D775E989CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D717
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 5b753d02ee4b71410be435ea4c8aa3e47d6938f82a30984bd9e39fab7219ab7e
                                                              • Instruction ID: 1dc4f1217324a67aa1471e71ab2f09109f08c01e39f6eb604797699bff759ed1
                                                              • Opcode Fuzzy Hash: 5b753d02ee4b71410be435ea4c8aa3e47d6938f82a30984bd9e39fab7219ab7e
                                                              • Instruction Fuzzy Hash: AD3172746443809FE708AF61E84476D3BB1FB85712F508A2AE9619F7D8DEB84C4ACF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06DA5B78
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: d36906694d0e397c09ff11a5a51168254286fc2432c32bbace34d9a1ed5a0806
                                                              • Instruction ID: 0731837003b535cbf15f1464dcd76fb4a837b63e759f3c9363616f75d13540d2
                                                              • Opcode Fuzzy Hash: d36906694d0e397c09ff11a5a51168254286fc2432c32bbace34d9a1ed5a0806
                                                              • Instruction Fuzzy Hash: DC212272D003499FDB10CFAAC880BEEBBF5FF48310F10852AE919A7240C7799944CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06DA5C58
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 5f8eff2bd19d2a3ea469c104b9d84d8f12ac607084a485ca59eb548e97bf8782
                                                              • Instruction ID: ec2a426ada43722c97ee2263346d7a90e34db864ade527d1b22f4d64bd56ba36
                                                              • Opcode Fuzzy Hash: 5f8eff2bd19d2a3ea469c104b9d84d8f12ac607084a485ca59eb548e97bf8782
                                                              • Instruction Fuzzy Hash: BE21F6B18003499FDB10CFAAC984BDEBBF5FF48310F10842AE559A7240C7799945CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DA515E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 30aab97350445e0347552ac293e30d1509bf72f8dd1a07e806dd2e06ac22cc8d
                                                              • Instruction ID: 72663786c8fe497a9a6ec22877ec32c4f56cbde802fe6b3c3996e482a682c4d1
                                                              • Opcode Fuzzy Hash: 30aab97350445e0347552ac293e30d1509bf72f8dd1a07e806dd2e06ac22cc8d
                                                              • Instruction Fuzzy Hash: A62148B1D003098FDB50CFAAC8847EEBBF4EF48320F14842AD559A7240CB789945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06DA5C58
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 0e2b07dc066c41d6181d98dc95f0fb5d28e67846c7f27ea02bf6b28e0cfbc334
                                                              • Instruction ID: 668eaf9d3ee4f72df64668430bbbdab615f3574632b28aa19c6dc3c3c04776fa
                                                              • Opcode Fuzzy Hash: 0e2b07dc066c41d6181d98dc95f0fb5d28e67846c7f27ea02bf6b28e0cfbc334
                                                              • Instruction Fuzzy Hash: C12125B1C003499FDB10CFAAC880BEEBBF5FF48310F10842AE919A7240C7799944CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DA515E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 61482b528efa1badf8d53f626b66554e6344ee0fdaa3df2fab42e49eee0b6160
                                                              • Instruction ID: 12f2b3d69173f622fcc54667ce0dd540dfae24a634a5a4451e519aa1e61c039c
                                                              • Opcode Fuzzy Hash: 61482b528efa1badf8d53f626b66554e6344ee0fdaa3df2fab42e49eee0b6160
                                                              • Instruction Fuzzy Hash: 82213571D003098FDB14CFAAC884BEEBBF4EF48320F14842AD519A7240CB789945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D717
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: a4ace088b8c655d705d72adfc218515d357734f60bd449a574563e21f0aa792a
                                                              • Instruction ID: 7b747157c6f208f19e5fa90867a8018f1bfe56f5fd63abff0c5ec37d43af1d9e
                                                              • Opcode Fuzzy Hash: a4ace088b8c655d705d72adfc218515d357734f60bd449a574563e21f0aa792a
                                                              • Instruction Fuzzy Hash: E521C4B5D00248DFDB10CF9AD984ADEBBF5FB48310F14841AE918A7350D379A954CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06DA5A96
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 8e747f0623b7b9167ad1953235a22eb495827ea48c4d66895ec52e1366d4f4ca
                                                              • Instruction ID: d9f9cfc9c0f162fa4d7a20016bb9b2dbe0c9db8ad3fc1001f4f2d0693a6b39b8
                                                              • Opcode Fuzzy Hash: 8e747f0623b7b9167ad1953235a22eb495827ea48c4d66895ec52e1366d4f4ca
                                                              • Instruction Fuzzy Hash: D1215671900349DFDB20DFAAC844BDEBBF5EF49310F108819E555A7250CB7AA504CBA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06DA5A96
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 9c8d608e281f0b3672fcfa205ddb211b3517f7a8b151149ce87922c24f1f32b5
                                                              • Instruction ID: 39dcedbeb0d5f5d20d45c8c7184bba2698a035557c65c1dcf3391b2a506ea6f4
                                                              • Opcode Fuzzy Hash: 9c8d608e281f0b3672fcfa205ddb211b3517f7a8b151149ce87922c24f1f32b5
                                                              • Instruction Fuzzy Hash: 3B112672900349DFDB24DFAAC844BDEBBF5EF48310F148819E519A7250CB7AA544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 9076d7f855c5a4d905cdc7540f9dcfc28f54a7e542a7ee176fe4e8e433f40019
                                                              • Instruction ID: 88997c60f3cf82b9d2beb2cf8740764bcffa926e59369796ab12f4b06dc42bd9
                                                              • Opcode Fuzzy Hash: 9076d7f855c5a4d905cdc7540f9dcfc28f54a7e542a7ee176fe4e8e433f40019
                                                              • Instruction Fuzzy Hash: 70113471D043488FDB24DFAAC84479EBBF4EF48324F24881AD559AB240CB7A9945CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 49d0f46fdbfe63770c6cbeac893ff61ee683d4caffb160c28aad56c272536fab
                                                              • Instruction ID: 519c4c5427bfefdabca0c9b601c657a0587cda9404dcce9f83b50c6f914a5978
                                                              • Opcode Fuzzy Hash: 49d0f46fdbfe63770c6cbeac893ff61ee683d4caffb160c28aad56c272536fab
                                                              • Instruction Fuzzy Hash: 46112871D00348CFDB24DFAAC4447DEFBF5EF48214F148419D519A7240CB79A544CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3AFFE
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1266865870.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_e30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 52f6a50be2fce9cd4d918ba478357683279aa6e020e0f417547d09f4d2898931
                                                              • Instruction ID: 6df10bc18748aa0699623cbf93b87e075c180742fa17074d9b0060cb50ea41a4
                                                              • Opcode Fuzzy Hash: 52f6a50be2fce9cd4d918ba478357683279aa6e020e0f417547d09f4d2898931
                                                              • Instruction Fuzzy Hash: A4110FB6C00249CFDB24CF9AC444BDEFBF4EB88314F10842AD529A7210C379A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06DA976D
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285571498.0000000006DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6da0000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 441eccb91653066c78aafd660759fc7426aa996feadc6b6e46925d7cea9a05f8
                                                              • Instruction ID: e599fe23f3f74e51eee5e327c860b3b6e7385183cd767973a3c559960c700fc1
                                                              • Opcode Fuzzy Hash: 441eccb91653066c78aafd660759fc7426aa996feadc6b6e46925d7cea9a05f8
                                                              • Instruction Fuzzy Hash: 0511C5B5800349DFDB50DF9AD585BDEBBF8EB48310F208419E558A7250C379A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Teq
                                                              • API String ID: 0-1098410595
                                                              • Opcode ID: f611459f2a9436531049416e600f5f828838c0ccedc4ca6fb3b50ec4bac755df
                                                              • Instruction ID: 1c11480ebd59085ae64ffb771999036b3769365f06f261a06fdaa638de0a850e
                                                              • Opcode Fuzzy Hash: f611459f2a9436531049416e600f5f828838c0ccedc4ca6fb3b50ec4bac755df
                                                              • Instruction Fuzzy Hash: 1751B271B006158FDB10DB79D8449BEB7F6EFC4320B19852AE469DB391EB30DC058791
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRq
                                                              • API String ID: 0-3187445251
                                                              • Opcode ID: 831e0818a6bb833ea92f271768c7427cce9ef5ab0a356ba3b3d1591f18737c5b
                                                              • Instruction ID: ae86e541f9022e07e283e040e4d4ac08e0e2b66aa7ff4a36fd42f6e220444f91
                                                              • Opcode Fuzzy Hash: 831e0818a6bb833ea92f271768c7427cce9ef5ab0a356ba3b3d1591f18737c5b
                                                              • Instruction Fuzzy Hash: 91410374E046188FDB18DFA9D495AEEBBF2FB98310F109129E415BB354EB345941CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Teq
                                                              • API String ID: 0-1098410595
                                                              • Opcode ID: 120abfca728ab6c4509144b8c10c716e5da14b9e9c8d24f64cb6ad02a651eb0e
                                                              • Instruction ID: 026c20ca9568f84cc9b4ab4502af80c3b618fd2c6f8535e0ec8ab14e2451b08b
                                                              • Opcode Fuzzy Hash: 120abfca728ab6c4509144b8c10c716e5da14b9e9c8d24f64cb6ad02a651eb0e
                                                              • Instruction Fuzzy Hash: 8B112772F002198BCF94EBB998116FEBBF6AF88311B244069C555EB244EF35CD15CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cdfc2312dffbe371c2b16f79ecc1b0ae7e4bd4fa79719e99b0a9d7abf945269b
                                                              • Instruction ID: e023b6c4469189697d7829b5b7af1571cae2e4d4623f5bfd0958e09ee42d892f
                                                              • Opcode Fuzzy Hash: cdfc2312dffbe371c2b16f79ecc1b0ae7e4bd4fa79719e99b0a9d7abf945269b
                                                              • Instruction Fuzzy Hash: FF613871A00619DFDB54DFA8C894A9DBBB1FF88310F248159E849AB360DB71ED81CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dcdf5c983df7db4557d58a1f45f89f7a4b0f0bd6957fa1ab2f414d5ed246c462
                                                              • Instruction ID: f859a1c71248b0514a44e42a19092b7d2aafa7a4d69016a76ca69d13583cbe08
                                                              • Opcode Fuzzy Hash: dcdf5c983df7db4557d58a1f45f89f7a4b0f0bd6957fa1ab2f414d5ed246c462
                                                              • Instruction Fuzzy Hash: 0B510074E04618AFDB59DFA8D884AAEBBF2FF89310F109029E805BB355CB349945CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0c8e6f439296e79bbcbf9fbc5b2d2bb8c3a31618c53cea24cbcad5dddb3d092
                                                              • Instruction ID: 0334149d639f498580a0a6a85f252eea87e69cce92c3dd1a3ab3254436ebe2f4
                                                              • Opcode Fuzzy Hash: c0c8e6f439296e79bbcbf9fbc5b2d2bb8c3a31618c53cea24cbcad5dddb3d092
                                                              • Instruction Fuzzy Hash: 89410874D0821D8FEB44CFAAD5486EEBBF6EB8C301F14D069D859A7251D7309941CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 107bf8d305c6bf3f7ea3d5a0131ecb00675d1dfcde613dd26f8269d9534c80ab
                                                              • Instruction ID: 282e409d0615b1b2421331e9ec87df96660756d24ee86b83d18d5ac6c49266ad
                                                              • Opcode Fuzzy Hash: 107bf8d305c6bf3f7ea3d5a0131ecb00675d1dfcde613dd26f8269d9534c80ab
                                                              • Instruction Fuzzy Hash: 6141DF74E112189FDB00DFA8D885AEEBBF2FB48320F14A559E804B7355DB35A994CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: da43c346bf871e212be0172f82c04714227235d6c6fbfe8166365af250d771e4
                                                              • Instruction ID: aca36b718ebc05a88c64457754500fc02398fc0238754c2df6760f2b577a31e8
                                                              • Opcode Fuzzy Hash: da43c346bf871e212be0172f82c04714227235d6c6fbfe8166365af250d771e4
                                                              • Instruction Fuzzy Hash: 6B411574E102199FDB54DFA9D485AAEBBF1EF89310F14846AE815FB350DB31E902CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f204391db7bb0ff0e4f398e21a4630faaf441274b5fa72306ddd4e66a6ea2900
                                                              • Instruction ID: 37983d0f2b44da7b0c206cea42a1ea14a2ba027fdfa5798d85fb757c5a27e960
                                                              • Opcode Fuzzy Hash: f204391db7bb0ff0e4f398e21a4630faaf441274b5fa72306ddd4e66a6ea2900
                                                              • Instruction Fuzzy Hash: 90312774E002099FDB15DFA8E881AEEBBB1FF88310F109525E914AB354DB709A41CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1265519604.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_c3d000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 061b27b8280c607a437dd39b9d4170aef6aae35013125015f5ad706703d4b832
                                                              • Instruction ID: ec743c6e6c08ca6d13d3d9314c61f3e77a3597848139d66fb09bcb669d25ae3b
                                                              • Opcode Fuzzy Hash: 061b27b8280c607a437dd39b9d4170aef6aae35013125015f5ad706703d4b832
                                                              • Instruction Fuzzy Hash: B921F5B2514240EFDB15DF14E9C0B26BF65FB88318F24C569E90A0F256C336D956CBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1265588293.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_c4d000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aa787ae4518212faab0ab1ac8a75d304c977f7bcca2c1b68ee4eb4b708e8cec3
                                                              • Instruction ID: f62cd9810e52622fa652d32f8769eca767570ed75e50d00a5717f2ff8b42effb
                                                              • Opcode Fuzzy Hash: aa787ae4518212faab0ab1ac8a75d304c977f7bcca2c1b68ee4eb4b708e8cec3
                                                              • Instruction Fuzzy Hash: 7521C275604344EFDB24EF24D9C4B26BB65FB84314F24C5ADE90A4B296C33AD847CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6ed8cf79dbf78b2322374f9e75d40bf038912c063b5fda96254802231c77151
                                                              • Instruction ID: 2f28aae6379879f636c4d6a9cb08c7822120487a0d863d830c2533fe2e3f6f74
                                                              • Opcode Fuzzy Hash: c6ed8cf79dbf78b2322374f9e75d40bf038912c063b5fda96254802231c77151
                                                              • Instruction Fuzzy Hash: E231E570A11908DFC754DF99E68599DBBF1FF88310B6191D4E449AB369EB30AE10DB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9457b78811e11bebe6b20ef65147c4418515b52522f4143c603ba30fbc48c354
                                                              • Instruction ID: 760f699a071160f8107ef529684c5f662aaddbcd60d0a0a11e615491f0794262
                                                              • Opcode Fuzzy Hash: 9457b78811e11bebe6b20ef65147c4418515b52522f4143c603ba30fbc48c354
                                                              • Instruction Fuzzy Hash: C821B3B0D11358DFDB60CF9AC984B8EBFF5AB48714F24801AE444BB294C7B95845CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb814bce0e3dadfd6fe5f6a77c3cf85a78c024ebc361445a5959dcf57600491e
                                                              • Instruction ID: 74f722a441cd925fabc0e39efbbc12918b3a643934b5437c12e72a4771bdbe09
                                                              • Opcode Fuzzy Hash: cb814bce0e3dadfd6fe5f6a77c3cf85a78c024ebc361445a5959dcf57600491e
                                                              • Instruction Fuzzy Hash: 271104B2F04308AFDB45DF74CC19A6E77F9DB95204B2444EB9809C7341E930DD068721
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1265588293.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_c4d000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0ba31d8fa3d1e25f00525da0f892df0b3f95c086c6a39bdddb5d597851cdbd6e
                                                              • Instruction ID: 06332832f491d14e482fd3880b12a83f6adcf2a059f7ecba23198c649e3ffd53
                                                              • Opcode Fuzzy Hash: 0ba31d8fa3d1e25f00525da0f892df0b3f95c086c6a39bdddb5d597851cdbd6e
                                                              • Instruction Fuzzy Hash: E8218E755093809FCB16DF20D994715BF71FB46314F28C5EAD8498F6A7C33A980ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aacdc8ad33062b3bb680aa8d02b386d09fffd27f21a1fdb5881502e4462b6436
                                                              • Instruction ID: 7d13ef831c6459388b1f257dc13c36c416389aaa9a7449ce311065e3c424dbb0
                                                              • Opcode Fuzzy Hash: aacdc8ad33062b3bb680aa8d02b386d09fffd27f21a1fdb5881502e4462b6436
                                                              • Instruction Fuzzy Hash: A8114F71D1075B9ACF41EFB9C8550EDFBB0FF85310B108A1AE558B7100EB70A689CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3493a8c6cf692ebde0b8bc94bd12609bdbc8d1b0d9f2aa43e8e46101ef001e55
                                                              • Instruction ID: ebe26ddd4d0220468d81bc38c9bbe33c0069f12d5b31a6461cf631d09049e459
                                                              • Opcode Fuzzy Hash: 3493a8c6cf692ebde0b8bc94bd12609bdbc8d1b0d9f2aa43e8e46101ef001e55
                                                              • Instruction Fuzzy Hash: 0321B6B4E0421DDFDB84CFA9C1819AEBBF5EB48300F609469D809B7716D7709A41CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b6ba04173f4bbfe9e6340f873b16da332510b6700c8a1c9a61d70cce706c808e
                                                              • Instruction ID: 2570b73b12665f4366ff9bb1d35eee3bc20b9c016591d768fc3941e2b1e7e33a
                                                              • Opcode Fuzzy Hash: b6ba04173f4bbfe9e6340f873b16da332510b6700c8a1c9a61d70cce706c808e
                                                              • Instruction Fuzzy Hash: 0A21C2B5D04359DFDB20CF9AD884ADEBBF4FB48310F10841AE919A7210C379A954CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1265519604.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_c3d000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                              • Instruction ID: a355e6a5c7e5ef931ae9d3d7dcd042f1f0e5f0f218cfb273da70eb89972ffc4d
                                                              • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                              • Instruction Fuzzy Hash: 8911D3B6504280DFCB16CF10E5C4B16BF71FB94314F24C6A9D84A0B656C336D956CBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5a744745d29dc549f334d7900a7d0f675aca8812bff24998038b5b6e6adea300
                                                              • Instruction ID: 1617535660a2de9083aae648cf063e508115c889eab60d093a67bc0af07f46b2
                                                              • Opcode Fuzzy Hash: 5a744745d29dc549f334d7900a7d0f675aca8812bff24998038b5b6e6adea300
                                                              • Instruction Fuzzy Hash: 8811E2B5E0831CDFDB84DFA9C5409AEBBF9EB48310F1495A59458E7316D770AA418F80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6ab7c20c39d2a43f384f6846ed8f578c4446879cdadeb1abe7301c9f64ba52f9
                                                              • Instruction ID: 79c37517a224df8ddc1792193ff5cd6b954b11c02d7e8719d221aa7bb3b69ea9
                                                              • Opcode Fuzzy Hash: 6ab7c20c39d2a43f384f6846ed8f578c4446879cdadeb1abe7301c9f64ba52f9
                                                              • Instruction Fuzzy Hash: 3B11E674A2190CDFC760DF98E189999BFF0FB48320F5250D5E889AB355DB30AAA0CB45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6667f438f8a17ce6f9c251f6e6f3fbd36db6a450aa86391b14f4ea43162d92bd
                                                              • Instruction ID: 0b813596653389853a6903a39e00969dd309bd60dc5b70f73fe0bb130585772d
                                                              • Opcode Fuzzy Hash: 6667f438f8a17ce6f9c251f6e6f3fbd36db6a450aa86391b14f4ea43162d92bd
                                                              • Instruction Fuzzy Hash: EFF0F672714328AFDF88DFB8E84599E7FBAEF84210B10846BE505D7220EA30DD048754
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eec7c81c244912124d7170ec5e6590d37ce12cb13e10218785b5eaa0f7e93ddd
                                                              • Instruction ID: 54c3513fae9e0bd3b2e3759c7ac429335e233f2f16d0b831bb6a2d3c44a18562
                                                              • Opcode Fuzzy Hash: eec7c81c244912124d7170ec5e6590d37ce12cb13e10218785b5eaa0f7e93ddd
                                                              • Instruction Fuzzy Hash: 01F0A575E05208EFCB94DFA8D585A9DBBF5EB48310F10C0AAA819A7350E6719A51DF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 06d98ed02f047a0300ec7eb93174ba444f8ec59522e712d8cfe084d5c4bfa35e
                                                              • Instruction ID: c14edbdcf74d7b4998362f23310ec308f740c7815f77dbc300723ee73c6c4912
                                                              • Opcode Fuzzy Hash: 06d98ed02f047a0300ec7eb93174ba444f8ec59522e712d8cfe084d5c4bfa35e
                                                              • Instruction Fuzzy Hash: 73F01EB0D0420CEFCB50DFA8D445AADBBB5EB09301F1080AAE848A3360DB309A84DF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8f358784ad1c8f1ac14d0fc6776f655dcec383634cdc0c434a5e674163de638f
                                                              • Instruction ID: 48bcd28c684b39c570c0fd93d764e4fc2248bf077925e098f60ae0c16a8a6584
                                                              • Opcode Fuzzy Hash: 8f358784ad1c8f1ac14d0fc6776f655dcec383634cdc0c434a5e674163de638f
                                                              • Instruction Fuzzy Hash: 84E01A3690420CEFDB14DF94D9819ADBF75EB49320F20C099EC152B350DB729AA2EB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e62974401ae2ff116ae73042e4c9b6e96350c910ed766127fdab19a1ecb95f3d
                                                              • Instruction ID: e6fa238b997983314389437a95b6ac199e10f9fdc5e7cda388ca19716dc51974
                                                              • Opcode Fuzzy Hash: e62974401ae2ff116ae73042e4c9b6e96350c910ed766127fdab19a1ecb95f3d
                                                              • Instruction Fuzzy Hash: 70E04F7590420CFFCB44DF94E9419ACBF75EF45320F20C199EC4417350C6329A55EB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5a8e137ab810826bec0dcdae846a64cf3cfecbe2be430ca31e46bc1ef8095730
                                                              • Instruction ID: d524d4da2eee5e7a635a8624264c1d2bc66f6b3cf8c005c6d1f3b4870444e839
                                                              • Opcode Fuzzy Hash: 5a8e137ab810826bec0dcdae846a64cf3cfecbe2be430ca31e46bc1ef8095730
                                                              • Instruction Fuzzy Hash: 18E0C27180561CDFE760EFF0C94469E7BFCEB0A221F1045A9F98A83220EE304A40DBE1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53f6e4397e46c9d66f11eb0c23b7e928b16b2c7e199f4c10e32d095b64850d9f
                                                              • Instruction ID: 5987fa4f908cb6488069355a7edd99f2103074a9944371adf68228202a82770f
                                                              • Opcode Fuzzy Hash: 53f6e4397e46c9d66f11eb0c23b7e928b16b2c7e199f4c10e32d095b64850d9f
                                                              • Instruction Fuzzy Hash: FDE08674D0420CEFC704DF94E5459ACBFB8EB95311F20C49AEC4417340C6719E51EB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf43bc5f68c530eb9935315c62e6f490c720c858bbf7e10ceaffd51080e9574f
                                                              • Instruction ID: d84df3981606456f43cb515a73437bf7db0ec51c8f226ee98bc4f07b2ff8c072
                                                              • Opcode Fuzzy Hash: bf43bc5f68c530eb9935315c62e6f490c720c858bbf7e10ceaffd51080e9574f
                                                              • Instruction Fuzzy Hash: 9CE08C34A08208DBC704EFA4D98556CBBB8AB45314F2080A9980917350CA31AE42DB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb3740b66d8caf997d56b884c517e3851b300081025c1b56d2eca1ede8153309
                                                              • Instruction ID: 84af3096da3387a492e2478ae41ec2fe8f78d0babd2141ec0f20072446fe039a
                                                              • Opcode Fuzzy Hash: bb3740b66d8caf997d56b884c517e3851b300081025c1b56d2eca1ede8153309
                                                              • Instruction Fuzzy Hash: AAD0A7712485D4CECF14DF60E6A52187B21FF02221F60456ED05982452C7244010CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 74a7d2f73625686e1422a41aee88dee87fa793c1f0285c3aa57d96ff1ede0cd7
                                                              • Instruction ID: 37b9100d9dc2822641b343e7b180be679e82589b27ee79c736d7cdf138ae1c72
                                                              • Opcode Fuzzy Hash: 74a7d2f73625686e1422a41aee88dee87fa793c1f0285c3aa57d96ff1ede0cd7
                                                              • Instruction Fuzzy Hash: A8C02B31009B0C8FE3701784A20D3303AFC4303132F00E000601E024310EB090C0C7A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.1285281247.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_6d30000_SVcPIbJno.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 808bab28e6411d9a2f9298a640561eb9f3b95b3da4d6679126e3b8098a924b6d
                                                              • Instruction ID: 4972c7e74c1dd06f533b3188723dd03930745ffdd09f14b657660729da5271a5
                                                              • Opcode Fuzzy Hash: 808bab28e6411d9a2f9298a640561eb9f3b95b3da4d6679126e3b8098a924b6d
                                                              • Instruction Fuzzy Hash: 3AC04C32451A888BD7296795A60E725BFB8EB11317F441421E64D415615EA05450CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:10.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:151
                                                              Total number of Limit Nodes:16
                                                              execution_graph 40638 66a2e08 40639 66a2e4e GetCurrentProcess 40638->40639 40641 66a2e99 40639->40641 40642 66a2ea0 GetCurrentThread 40639->40642 40641->40642 40643 66a2edd GetCurrentProcess 40642->40643 40644 66a2ed6 40642->40644 40645 66a2f13 40643->40645 40644->40643 40646 66a2f3b GetCurrentThreadId 40645->40646 40647 66a2f6c 40646->40647 40648 156d030 40649 156d048 40648->40649 40652 156d0a2 40649->40652 40655 66ad9c8 40649->40655 40659 66acc44 40649->40659 40668 66ad9b7 40649->40668 40672 66ae718 40649->40672 40656 66ad9ee 40655->40656 40657 66acc44 CallWindowProcW 40656->40657 40658 66ada0f 40657->40658 40658->40652 40660 66acc4f 40659->40660 40661 66ae789 40660->40661 40663 66ae779 40660->40663 40697 66acd6c 40661->40697 40681 66ae97c 40663->40681 40687 66ae8b0 40663->40687 40692 66ae8a0 40663->40692 40664 66ae787 40669 66ad9c8 40668->40669 40670 66acc44 CallWindowProcW 40669->40670 40671 66ada0f 40670->40671 40671->40652 40675 66ae755 40672->40675 40673 66ae789 40674 66acd6c CallWindowProcW 40673->40674 40677 66ae787 40674->40677 40675->40673 40676 66ae779 40675->40676 40678 66ae97c CallWindowProcW 40676->40678 40679 66ae8a0 CallWindowProcW 40676->40679 40680 66ae8b0 CallWindowProcW 40676->40680 40678->40677 40679->40677 40680->40677 40682 66ae93a 40681->40682 40683 66ae98a 40681->40683 40701 66ae968 40682->40701 40704 66ae958 40682->40704 40684 66ae950 40684->40664 40689 66ae8c4 40687->40689 40688 66ae950 40688->40664 40690 66ae968 CallWindowProcW 40689->40690 40691 66ae958 CallWindowProcW 40689->40691 40690->40688 40691->40688 40693 66ae8b0 40692->40693 40695 66ae968 CallWindowProcW 40693->40695 40696 66ae958 CallWindowProcW 40693->40696 40694 66ae950 40694->40664 40695->40694 40696->40694 40698 66acd77 40697->40698 40699 66afe6a CallWindowProcW 40698->40699 40700 66afe19 40698->40700 40699->40700 40700->40664 40702 66ae979 40701->40702 40708 66afdb0 40701->40708 40702->40684 40705 66ae968 40704->40705 40706 66ae979 40705->40706 40707 66afdb0 CallWindowProcW 40705->40707 40706->40684 40707->40706 40709 66acd6c CallWindowProcW 40708->40709 40710 66afdba 40709->40710 40710->40702 40819 2e67350 40821 2e67396 DeleteFileW 40819->40821 40822 2e673cf 40821->40822 40823 66a3050 DuplicateHandle 40824 66a30e6 40823->40824 40711 2e60848 40713 2e6084e 40711->40713 40712 2e6091b 40713->40712 40717 66a1cf0 40713->40717 40721 66a1d00 40713->40721 40725 2e61390 40713->40725 40718 66a1d0f 40717->40718 40729 66a14d4 40718->40729 40722 66a1d0f 40721->40722 40723 66a14d4 3 API calls 40722->40723 40724 66a1d30 40723->40724 40724->40713 40727 2e613a6 40725->40727 40726 2e614b4 40726->40713 40727->40726 40806 2e67528 40727->40806 40730 66a14df 40729->40730 40733 66a2c2c 40730->40733 40732 66a36b6 40732->40732 40734 66a2c37 40733->40734 40735 66a3ddc 40734->40735 40737 66a5a60 40734->40737 40735->40732 40738 66a5a81 40737->40738 40739 66a5aa5 40738->40739 40741 66a5c10 40738->40741 40739->40735 40743 66a5c1d 40741->40743 40742 66a5c56 40742->40739 40743->40742 40745 66a495c 40743->40745 40746 66a4967 40745->40746 40748 66a5cc8 40746->40748 40749 66a4990 40746->40749 40748->40748 40750 66a499b 40749->40750 40756 66a49a0 40750->40756 40752 66a5d37 40760 66aaf48 40752->40760 40769 66aaf60 40752->40769 40753 66a5d71 40753->40748 40759 66a49ab 40756->40759 40757 66a6ed8 40757->40752 40758 66a5a60 3 API calls 40758->40757 40759->40757 40759->40758 40762 66aaf91 40760->40762 40763 66ab091 40760->40763 40761 66aaf9d 40761->40753 40762->40761 40778 66ab1c8 40762->40778 40782 66ab1d8 40762->40782 40763->40753 40764 66aafdd 40785 66ac4d8 40764->40785 40789 66ac4c9 40764->40789 40771 66aaf91 40769->40771 40772 66ab091 40769->40772 40770 66aaf9d 40770->40753 40771->40770 40776 66ab1c8 2 API calls 40771->40776 40777 66ab1d8 2 API calls 40771->40777 40772->40753 40773 66aafdd 40774 66ac4d8 CreateWindowExW 40773->40774 40775 66ac4c9 CreateWindowExW 40773->40775 40774->40772 40775->40772 40776->40773 40777->40773 40779 66ab1d8 40778->40779 40793 66ab218 40779->40793 40780 66ab1e2 40780->40764 40784 66ab218 2 API calls 40782->40784 40783 66ab1e2 40783->40764 40784->40783 40786 66ac503 40785->40786 40787 66ac5b2 40786->40787 40801 66ad7c5 40786->40801 40790 66ac503 40789->40790 40791 66ac5b2 40790->40791 40792 66ad7c5 CreateWindowExW 40790->40792 40792->40791 40794 66ab21d 40793->40794 40795 66ab25c 40794->40795 40799 66ab4b3 LoadLibraryExW 40794->40799 40800 66ab4c0 LoadLibraryExW 40794->40800 40795->40780 40796 66ab254 40796->40795 40797 66ab460 GetModuleHandleW 40796->40797 40798 66ab48d 40797->40798 40798->40780 40799->40796 40800->40796 40802 66ad7c9 40801->40802 40803 66ad7fd CreateWindowExW 40801->40803 40802->40787 40805 66ad934 40803->40805 40807 2e67532 40806->40807 40810 2e6754c 40807->40810 40811 66dd6df 40807->40811 40815 66dd6f0 40807->40815 40810->40727 40812 66dd6e3 40811->40812 40813 66dd91a 40812->40813 40814 66dd930 GlobalMemoryStatusEx 40812->40814 40813->40810 40814->40812 40816 66dd705 40815->40816 40817 66dd91a 40816->40817 40818 66dd930 GlobalMemoryStatusEx 40816->40818 40817->40810 40818->40816

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1008 66a2e08-66a2e97 GetCurrentProcess 1012 66a2e99-66a2e9f 1008->1012 1013 66a2ea0-66a2ed4 GetCurrentThread 1008->1013 1012->1013 1014 66a2edd-66a2f11 GetCurrentProcess 1013->1014 1015 66a2ed6-66a2edc 1013->1015 1017 66a2f1a-66a2f35 call 66a2fd8 1014->1017 1018 66a2f13-66a2f19 1014->1018 1015->1014 1021 66a2f3b-66a2f6a GetCurrentThreadId 1017->1021 1018->1017 1022 66a2f6c-66a2f72 1021->1022 1023 66a2f73-66a2fd5 1021->1023 1022->1023
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 066A2E86
                                                              • GetCurrentThread.KERNEL32 ref: 066A2EC3
                                                              • GetCurrentProcess.KERNEL32 ref: 066A2F00
                                                              • GetCurrentThreadId.KERNEL32 ref: 066A2F59
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 1e12009ec22c2a26a509d87a350dd2a1179e808f7a306db7ae49bad4f7ec807a
                                                              • Instruction ID: 4bd26729e3dfd0b24af45b8a2201d5084bc3acfc87cb1f8e1606b6d6fc5d444f
                                                              • Opcode Fuzzy Hash: 1e12009ec22c2a26a509d87a350dd2a1179e808f7a306db7ae49bad4f7ec807a
                                                              • Instruction Fuzzy Hash: 9F5145B0900749CFEB94CFA9D948BAEBBF5FB88314F248059E419AB360D7346944CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1030 66a2e03-66a2e97 GetCurrentProcess 1034 66a2e99-66a2e9f 1030->1034 1035 66a2ea0-66a2ed4 GetCurrentThread 1030->1035 1034->1035 1036 66a2edd-66a2f11 GetCurrentProcess 1035->1036 1037 66a2ed6-66a2edc 1035->1037 1039 66a2f1a-66a2f35 call 66a2fd8 1036->1039 1040 66a2f13-66a2f19 1036->1040 1037->1036 1043 66a2f3b-66a2f6a GetCurrentThreadId 1039->1043 1040->1039 1044 66a2f6c-66a2f72 1043->1044 1045 66a2f73-66a2fd5 1043->1045 1044->1045
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 066A2E86
                                                              • GetCurrentThread.KERNEL32 ref: 066A2EC3
                                                              • GetCurrentProcess.KERNEL32 ref: 066A2F00
                                                              • GetCurrentThreadId.KERNEL32 ref: 066A2F59
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: a39ba5889c775066088f0aaae48687e8e708bc72cfdd1867b72a42e7a9e94f70
                                                              • Instruction ID: 387e80a17f1b23d3600401d281b20e6bba076fe69c5f96cedb19350b1f63812d
                                                              • Opcode Fuzzy Hash: a39ba5889c775066088f0aaae48687e8e708bc72cfdd1867b72a42e7a9e94f70
                                                              • Instruction Fuzzy Hash: 7E5134B4900749CFEB94CFA9D548BAEBBF1EB88314F24845EE019AB360D7349944CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 066AB47E
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: c733c84f442c6c9c00bd7e4f4b75b1ca1268ec327473cd0c930460f61189c862
                                                              • Instruction ID: 56359130bce193ff909e1719a28d442e478109a777eaa317fe2c38932745d7b8
                                                              • Opcode Fuzzy Hash: c733c84f442c6c9c00bd7e4f4b75b1ca1268ec327473cd0c930460f61189c862
                                                              • Instruction Fuzzy Hash: 68813170A00B058FDBA4DF69D45476ABBF1FF88204F00892ED49ADBB50DB75A845CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066AD922
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 96488e338e1c442c4df8626ae63b633ac062d4f059a8061c9f47abc1c695cbdc
                                                              • Instruction ID: 6c77fec10e96ccad6b65ee0de453b76738cead500f4644bf0b4d96aa69b95dac
                                                              • Opcode Fuzzy Hash: 96488e338e1c442c4df8626ae63b633ac062d4f059a8061c9f47abc1c695cbdc
                                                              • Instruction Fuzzy Hash: D551CFB1C00349AFDF15CF99C984ADEBFB1BF48314F14826AE818AB260D7759955CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456631124.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66d0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d6e8ea25cb5c884b387ecfaf2e617ddfee831dddf9714dab9841c482303a83c
                                                              • Instruction ID: cb452403f183e8a2a41f930dfd4754b8c0b8fa828eaba1ac8c2a0452120e3207
                                                              • Opcode Fuzzy Hash: 7d6e8ea25cb5c884b387ecfaf2e617ddfee831dddf9714dab9841c482303a83c
                                                              • Instruction Fuzzy Hash: CD41E171E043598FDB14DFB9D8047AEBBF5AFC9310F14856AD404AB681EB389845CBE1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066AD922
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 3ef3a68fd6d3d8c64d203f94cfdd082492202c6919e40351ab6927c33395d12f
                                                              • Instruction ID: dec845d4e003ee3c2d9c62653b91a8a0a0108418ca97fdd8a29f67bdcb125bf4
                                                              • Opcode Fuzzy Hash: 3ef3a68fd6d3d8c64d203f94cfdd082492202c6919e40351ab6927c33395d12f
                                                              • Instruction Fuzzy Hash: 2351CDB1D003499FDB14CFA9C994ADEBBB1FF48314F24822AE818AB250D7749981CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066AD922
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: fbf1f85bd8ffc6cb9134c45f3a2ee055f1652e9b6784a528224a35af298128a1
                                                              • Instruction ID: abced0e1bbeb77828815bf6d6c2e6525739ec24cdc0e4f4776cb3b365265b7d5
                                                              • Opcode Fuzzy Hash: fbf1f85bd8ffc6cb9134c45f3a2ee055f1652e9b6784a528224a35af298128a1
                                                              • Instruction Fuzzy Hash: 3341AEB1D00349AFDB14CF9AC984ADEFBB5FF48350F24812AE818AB250D7759945CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 066AFE91
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: 3b50271d704dff4984d8c0dbdd43fb5f3ad7ea418b44725e0b6bf5e7420ad239
                                                              • Instruction ID: 27a112c12e2ffc9000331267b2d54eeb04812ad2c5695e3bb8baf966e4a96b38
                                                              • Opcode Fuzzy Hash: 3b50271d704dff4984d8c0dbdd43fb5f3ad7ea418b44725e0b6bf5e7420ad239
                                                              • Instruction Fuzzy Hash: 6B4149B5900349DFDB54CF99C488BAABBF5FB88314F24C448E519AB321D774A841CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066A30D7
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: d579d0884fdee614c3e61ad2c8cf90b88cfbc8e3e52a72315681e3de3a367317
                                                              • Instruction ID: 67e56c895c5881ab2eb16ce6afa3563c9c393abcd54fd4b8fc684bc857af5cea
                                                              • Opcode Fuzzy Hash: d579d0884fdee614c3e61ad2c8cf90b88cfbc8e3e52a72315681e3de3a367317
                                                              • Instruction Fuzzy Hash: 9721D4B5D00348AFDB10CFAAD984ADEBBF8EB48310F14841AE914A7350D375A940CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066A30D7
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 80378a26b9e24beec6c6dfbaa286d4ddc764f956a6f497fe13412faff47f8cad
                                                              • Instruction ID: 708c8d0e2ba12647d82634583273a67adc068c665e5762198847bf7b2f477607
                                                              • Opcode Fuzzy Hash: 80378a26b9e24beec6c6dfbaa286d4ddc764f956a6f497fe13412faff47f8cad
                                                              • Instruction Fuzzy Hash: 6D21B2B5D003489FDB10CF9AD984ADEBBF4EB48310F14841AE914A7350D379A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DeleteFileW.KERNELBASE(00000000), ref: 02E673C0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2447808065.0000000002E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_2e60000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DeleteFile
                                                              • String ID:
                                                              • API String ID: 4033686569-0
                                                              • Opcode ID: 15ef3590f5189d9b01970cdb07039e6ed5a5674b24054c207cdbc1f9a3efdf9a
                                                              • Instruction ID: 1e13ac96ceb46ee49c5367eedc7b058543aba10a8a3abc85446de16008450eec
                                                              • Opcode Fuzzy Hash: 15ef3590f5189d9b01970cdb07039e6ed5a5674b24054c207cdbc1f9a3efdf9a
                                                              • Instruction Fuzzy Hash: D82135B1C406599FDB24CFAAC545BEEFBF0EB48354F15812AD858A7240D338A905CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DeleteFileW.KERNELBASE(00000000), ref: 02E673C0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2447808065.0000000002E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_2e60000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: DeleteFile
                                                              • String ID:
                                                              • API String ID: 4033686569-0
                                                              • Opcode ID: f343dbf0b7c2c818fbe8a33ef524a3434a0b1f90709ea672cb6083b77b3b0e45
                                                              • Instruction ID: d43d1196e01eeda15a56cf439bf6e2ceee8339b7550cb1aa0efc9e5116ff4ef2
                                                              • Opcode Fuzzy Hash: f343dbf0b7c2c818fbe8a33ef524a3434a0b1f90709ea672cb6083b77b3b0e45
                                                              • Instruction Fuzzy Hash: C71136B1C406599FDB24CF9AC545BEEFBF4FB48364F14812AD818A7640D738A940CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,066AB4F9,00000800,00000000,00000000), ref: 066AB6EA
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 3aa490b2ec3e436d640521380323972aa18a2635aa64bc13359eb6ff28fe8882
                                                              • Instruction ID: 1832cc75a1910cb93022c0cea245cb8944eb5afb6dc5149b7600aa1481a2582e
                                                              • Opcode Fuzzy Hash: 3aa490b2ec3e436d640521380323972aa18a2635aa64bc13359eb6ff28fe8882
                                                              • Instruction Fuzzy Hash: 231106B6C003489FDB20CF9AD844B9EFBF4EB48310F10841AD515A7300C375A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,066AB4F9,00000800,00000000,00000000), ref: 066AB6EA
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: fc380b730c7259d33656b0e31d9efd984f688d384b5e066e3d5d918c1abc7417
                                                              • Instruction ID: a440ffc44a0ae1a8c7079292e05c8294aaa9faa64caefc404a6e32054c3afa00
                                                              • Opcode Fuzzy Hash: fc380b730c7259d33656b0e31d9efd984f688d384b5e066e3d5d918c1abc7417
                                                              • Instruction Fuzzy Hash: 4E11CFB6C003098FDB24CF9AD944BDEFBF4AB48210F14841AD459A7610C379A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 066DE63F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456631124.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66d0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: 654ca60d10a6b5397030a881614196ed8fdf6a461477b66fba1b6170543a5c9d
                                                              • Instruction ID: 60c1ff83a73ce4f2c918459cda65a0657cd050953f9c14c0a0acc3f02e83a233
                                                              • Opcode Fuzzy Hash: 654ca60d10a6b5397030a881614196ed8fdf6a461477b66fba1b6170543a5c9d
                                                              • Instruction Fuzzy Hash: DE11F3B1C006599FDB10CF9AC444BDEFBF4EF48324F15812AD918A7241D779A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 066AB47E
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2456382192.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_66a0000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 36fdbd4508a2ac871d982d14f1303ac413f8448324c9443dc3b1776ae84e50df
                                                              • Instruction ID: 4821cb931bd2399cdfa8a592388edecd3b614458643fce60efa9dcc1b6fa47fa
                                                              • Opcode Fuzzy Hash: 36fdbd4508a2ac871d982d14f1303ac413f8448324c9443dc3b1776ae84e50df
                                                              • Instruction Fuzzy Hash: 7711DFB6C007498FDB20CF9AC844BDEFBF4EB88214F10841AD819A7714D379A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2446609764.000000000156D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0156D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_156d000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e36af51602f39596401629ab94250d2c198190a8e375facb65b81ab43435aeb6
                                                              • Instruction ID: 7bcf80bbfe8f9e315730031e9ed41f1ff67ba11fdb3713d9985541ae00ccad02
                                                              • Opcode Fuzzy Hash: e36af51602f39596401629ab94250d2c198190a8e375facb65b81ab43435aeb6
                                                              • Instruction Fuzzy Hash: 68318C755093C09FCB13CF64C990715BF75AF46214F29C5DBD8898F2A3D23A980ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2446609764.000000000156D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0156D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_156d000_RegSvcs.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66323c3c612599717ccd6e1720621c78eb93375a3766fc2263e8c6470a6a3470
                                                              • Instruction ID: aba3aaaec9ecb668bb3132c650a6e2e050fc28efc4744098c7a14fa0918d8a4b
                                                              • Opcode Fuzzy Hash: 66323c3c612599717ccd6e1720621c78eb93375a3766fc2263e8c6470a6a3470
                                                              • Instruction Fuzzy Hash: F0212571604200DFDB15DF54D9C0B26BBB9FB84324F20C96DE8894F292D336D447CAA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: D@$D@$D@$D@$D@$D@
                                                              • API String ID: 0-3404515598
                                                              • Opcode ID: 1a5b2d51fff51a1b40bb693592a33cddba44cee37480c2c4c40dbdc7fb9ed377
                                                              • Instruction ID: 247f1d6558cda4542468ca7ce4cb2c23211190f228a89005962a75653fc698be
                                                              • Opcode Fuzzy Hash: 1a5b2d51fff51a1b40bb693592a33cddba44cee37480c2c4c40dbdc7fb9ed377
                                                              • Instruction Fuzzy Hash: 88225D70B00201CFD718EF39D99072A77A6FBC4309B209969D956AB798DB35EC89CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8q$D@$D@
                                                              • API String ID: 0-860540649
                                                              • Opcode ID: 871d0bb0b5d8ec250e36f81c71c3f80e0354d09c0a792e5d823cfa5180455c8c
                                                              • Instruction ID: d0af7de85c4debf7684c892b39dcbfbd3d088d3281536ffcbee3092ffeea6d5f
                                                              • Opcode Fuzzy Hash: 871d0bb0b5d8ec250e36f81c71c3f80e0354d09c0a792e5d823cfa5180455c8c
                                                              • Instruction Fuzzy Hash: F911E175A002089FC714EFB8E451BAD7BF6EBC4300F0040AAD609AB394EF349D06CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: D@
                                                              • API String ID: 0-2222373746
                                                              • Opcode ID: 58f3dcbf5f2f632575c3f556f628452b20dcf7909fec44567917b557075fe11d
                                                              • Instruction ID: 9892c5856ea6d28470def1621e8ee758f2ad3fde6de91dcf3fa969b66d878e8b
                                                              • Opcode Fuzzy Hash: 58f3dcbf5f2f632575c3f556f628452b20dcf7909fec44567917b557075fe11d
                                                              • Instruction Fuzzy Hash: D781B275A00304CFDB259FB5C51879ABBF2EF88304F148969E5166B7A4DF31AC89CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: tPq
                                                              • API String ID: 0-789928099
                                                              • Opcode ID: 17505efb73003537ba987c64725f3d4b5809b3e09990d78571302ec599a5f478
                                                              • Instruction ID: cede4af554f3af68ad1aeb74981192a6c1b4819dc2c1f05d77d9c4c074fa9d77
                                                              • Opcode Fuzzy Hash: 17505efb73003537ba987c64725f3d4b5809b3e09990d78571302ec599a5f478
                                                              • Instruction Fuzzy Hash: 1821D6357406108FC758AB38C458E2D77E6AF8971636118B8E506DF7B1DE35DC82CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b4bfb1e51411e7703278c090c6e15e3e845ce81bff41c7947a972e0dd577e00
                                                              • Instruction ID: 60e11b93c3c4cd8b6324adb121ec39f900294f546e3dc09c36e92d40db1e862e
                                                              • Opcode Fuzzy Hash: 9b4bfb1e51411e7703278c090c6e15e3e845ce81bff41c7947a972e0dd577e00
                                                              • Instruction Fuzzy Hash: 7A019235E002059FCB40EFB8D9419ABFBF5FF89300710866AE5199B225EB70A915CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 81aae4c05f6a2c48994eae8bcb4135c5db529756ced5b27c88e06ba15bf30a0e
                                                              • Instruction ID: 66f878f329da8757a0806fc562eb32f9a719bd33140acdcc456b4f173edf3bcc
                                                              • Opcode Fuzzy Hash: 81aae4c05f6a2c48994eae8bcb4135c5db529756ced5b27c88e06ba15bf30a0e
                                                              • Instruction Fuzzy Hash: 4DF01CB4A00305CFDB24EB74C6587AD7BF0AB48709F2418D8D902BB2A0DB758C89CB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.1363424978.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_e50000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dfce559d507b46c557b9adebdc650c7577a2b658939f661ff018c7cc4427fb65
                                                              • Instruction ID: af975538ae015eff66ed6c076e35756751d3db9986619bb21b53a9b38e18d24f
                                                              • Opcode Fuzzy Hash: dfce559d507b46c557b9adebdc650c7577a2b658939f661ff018c7cc4427fb65
                                                              • Instruction Fuzzy Hash: 78D017B1D01219AF8B40EFB999091DEBBF8FF08251B100566D909F3200E2705A148BD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8q$xX@snC<
                                                              • API String ID: 0-390084659
                                                              • Opcode ID: cd89682457db773f53f846a19023f0eef6eeb549e5e06b8dea1cfdb30c6cf863
                                                              • Instruction ID: 1d79f0b90d20c6f2f34f0677064d85c6c0b282816c3449fd2cde32ed8529a20a
                                                              • Opcode Fuzzy Hash: cd89682457db773f53f846a19023f0eef6eeb549e5e06b8dea1cfdb30c6cf863
                                                              • Instruction Fuzzy Hash: F3324F34B04701CFD728EF74D890A6A77A6BB88305B28896DD8568F399DF35ED41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: xX@snC<
                                                              • API String ID: 0-893197048
                                                              • Opcode ID: 5b8993e7624d63f36b287796b97c30bb61338d0c1aaa9e0439e4ba56f6ac572f
                                                              • Instruction ID: 03dcb2dec58c453bda1b4c77b69129b6670f429a34c7f8f0f2748e6650089aa3
                                                              • Opcode Fuzzy Hash: 5b8993e7624d63f36b287796b97c30bb61338d0c1aaa9e0439e4ba56f6ac572f
                                                              • Instruction Fuzzy Hash: 5681A435A00304CFDB299BB4C454B9EBBF2EF88300F25856AE4166B365DF75AD85CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: tPq
                                                              • API String ID: 0-789928099
                                                              • Opcode ID: 78ae9fac75f1b9d0819450374e0a4726b2ddffe4df3adbd4065d892215149eeb
                                                              • Instruction ID: af180181401dc8e6dae96be4f5887e9461743b2503cf3d7cdf59636f1869508f
                                                              • Opcode Fuzzy Hash: 78ae9fac75f1b9d0819450374e0a4726b2ddffe4df3adbd4065d892215149eeb
                                                              • Instruction Fuzzy Hash: AC31F5347406108FC769AB38C458E2D3BE6AF8A71636514B9E806DF7B1DE35DC82CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: tPq
                                                              • API String ID: 0-789928099
                                                              • Opcode ID: b89e3f7bb5006192a2ecce1e306a05c467d7bf2c954c35b8a6ed56ce82b0a02e
                                                              • Instruction ID: 25a63efb5b6af526bd2acc36132e9eb61e1d886532ec07dbf3427511fd3766be
                                                              • Opcode Fuzzy Hash: b89e3f7bb5006192a2ecce1e306a05c467d7bf2c954c35b8a6ed56ce82b0a02e
                                                              • Instruction Fuzzy Hash: 002105357406108FC768AB38C458E2D77E6AF8971636518B8E906DF7B1DE36DC82CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c23a33c4b7af57edb14545c987fc8d5ea97b02f68570ffc76896b84f3f5c365
                                                              • Instruction ID: fb1bf9beb83ad0db57060990af1a0d1dd32893dcfba714d1d852a42fbe81f547
                                                              • Opcode Fuzzy Hash: 3c23a33c4b7af57edb14545c987fc8d5ea97b02f68570ffc76896b84f3f5c365
                                                              • Instruction Fuzzy Hash: 3911C236E002019FC741EFB4C8409DABBF1FF8930031186AAE514EB221EB309915CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f7a11c1c2ca9a9283210b9be6b5ba832f62e60317bb1999956b8ec10de9deb19
                                                              • Instruction ID: 33030784a0238f4aaa83c9d6684ca5d9ad50669e6d349e920cd3f7a5e5ed4875
                                                              • Opcode Fuzzy Hash: f7a11c1c2ca9a9283210b9be6b5ba832f62e60317bb1999956b8ec10de9deb19
                                                              • Instruction Fuzzy Hash: E5015275E002059FCB44EFB8D8819ABFBF5FF89310710866AE5199B225EB70A915CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b5cf9eb66b6ad8bbaaa975bc7c6f93ffc2d8fb8006f805c54ab3c5504643415b
                                                              • Instruction ID: c7599ba32920ef7db0ae51be9ed0d6a982528b7cdedb1a45254a39e8385b8050
                                                              • Opcode Fuzzy Hash: b5cf9eb66b6ad8bbaaa975bc7c6f93ffc2d8fb8006f805c54ab3c5504643415b
                                                              • Instruction Fuzzy Hash: 14F0FF7090A395AFC7529B64AD154DB7FF4AE46210B1505ABE484E7162E2380F24CBE2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c47a303571e06310ab9185728c0010333c5f62c2fad4886378c027c60842bf2e
                                                              • Instruction ID: fbbd544caf0e4cbccfacae914d621dacd91c72f24c7c29659cca6894b8d87ea9
                                                              • Opcode Fuzzy Hash: c47a303571e06310ab9185728c0010333c5f62c2fad4886378c027c60842bf2e
                                                              • Instruction Fuzzy Hash: EEF01C74900305CFDB34DB78C499BAD7BF0AB08705F290898D502AB2A0DF748E85CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e79509729b30073dc6e4b15306ed16849123e7ed11b1a09d1d464fa6e94bb790
                                                              • Instruction ID: 4052c3bb35551fb982a20527a0dacd5ae5fc32ee468aabb91dbad59a477f26d6
                                                              • Opcode Fuzzy Hash: e79509729b30073dc6e4b15306ed16849123e7ed11b1a09d1d464fa6e94bb790
                                                              • Instruction Fuzzy Hash: F7D012357002149FC710EB65E949E453778AB49612F5441A5E908CB250EA61DD14C7D1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000001D.00000002.1446034586.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_29_2_c60000_boqXv.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 06d01a5a24aaf301115b28db1e8239fe74b31cc9795d562ad99cdd4c9f4e4b03
                                                              • Instruction ID: 4b309ceaffacf8afaef8dfec7a6d2a78f786fbeaee7c2109beee73a7ca525b47
                                                              • Opcode Fuzzy Hash: 06d01a5a24aaf301115b28db1e8239fe74b31cc9795d562ad99cdd4c9f4e4b03
                                                              • Instruction Fuzzy Hash: 60D067B1D01219AF8B50EFB999055DEBBF8FE09250B114566D919E3240E7705B10CBD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%